MIS Final
What is a URL? What is HTML?
URL- specifies location on the internet HTML- Hypertext Markup Language is the standard markup language for creating web pages and web applications
Major internet and network protocols and how they are used for communications. Ethernet, Bluetooth, WiFi, DSL, Cable, Wireless WAN
WAN- An interconnected group of computers and peripherals that covers a large geographical area, such as multiple branches of a corporation Ethernet- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. DSL- a technology for bringing high- bandwidth information to homes and small businesses over ordinary copper telephone lines
What is a style sheet? How does CSS work? Internal and external ways of using CSS
When a browser reads a style sheet, it will format the HTML document according to the information in the style sheet. internal-An internal style sheet may be used if one single page has a unique style. Internal styles are defined within the <style> element, inside the <head> section of an HTML page external-With an external style sheet, you can change the look of an entire website by changing just one file, link element
History of computers and IT. First programmer.
ada byron
Kinds of businesses that are not possible without IT and who were their founders (Google, Yahoo, Facebook, Alibaba, Uber, AirBnB, eBay, Amazon, etc)
all entirely online
What is MIS? Define an Information System and describe its components
an integrated set of components for collecting, storing, and processing data and for providing information, knowledge, and digital products. Components: hardware, software, people, database, and network
Explain how one should respond to security threats and practice safe computing
antivirus software, scan everything when launched
What are the different types of software? Systems software (including operating systems) application software, development software (programming languages)
application, development, system
How does HTML work? Simple tags in HTML and what they mean (HTML, Body, paragraph, headings, hyperlinks, image
body-<body> paragraph-<p> headings- <h1> hyperlinks- <a image- <img
Difference between character, paragraph and document formats, (e.g. Fonts, Line spacing, Format painter, Lists-numbered and multi-level, bullets
character- Character styles are used to define how individual characters appear, including attributes such as font, font size, and bold, italics, superscript paragraph-whether it should include bullets or numbering, how it should be treated by the spelling and grammar checkers, and how it should appear in relation to other paragraphs in the document
Different switching methods and how they work (circuit switching and packet switching)
circuit switching- limited devices on the network, communicated entirely from transmitting to receiving computer packet switching- use existing resources, message divided into packets (header, data, trailer)
What are some of the implications of Moore's Law?
claiming that moore's law implies a quadrupling of computing power due to the combination of more and faster transistors.
Describe the three-tier network
client, application server, data server
Generally, what is the goal of the information system in an organization?
communication, record keeping, data analysis
How do computers represent information? How does the monitor represent information?
computers-binary monitor- pictorial form
Using quotes when searching
concept is searched as a whole
Goals of the Windows 10 interface design
consistent across all devices
Why use styles and section break in word processing? What is the difference between a continuous section break and other types of section breaks?
continuous- insert section break and start new section on same page next, even, odd number breaks
Different kinds of communication media and their speeds (capacity)
copper- wireless- fiber optics-
How are data models used for database development?
data models are a logical representation of database data that describes relationships
What does the DNS do?
data source name, a data source name is a string that has an associated data structure used to describe a connection to a data source
What is metadata? What is a primary key and what is its role?
data that describes data, primary key- A field, or a collection of fields, whose values uniquely identify each record in a database table.
Differentiate between data and information. What attributes of information (accuracy, timeliness, relevance, etc.) makes some information better than others
data- numeric, textual, or symbolic values that represent concepts accuracy, timeliness, and relevance make some info better than others
Which template does a new blank document use?
default template
What does the HTTP protocol do
developed to facilitate hypertext and the World Wide Web, set of rules for viewing the webpage in a certain format
Explain the prevalence of the computer security problem
email is a big problem, confusing web adresses
Describe how organizations should respond to security threats
encryption, firewalls, passwords, backup and recovery
Conversion choices for system implementation (pilot, phased, plunge (cutover), etc)
Pilot- implement into limited portion of business, limits exposure to business if system fails Phased- system installed in phases or modules, each piece installed & tested Parallel- complete new and old systems run simultaneously, very safe but expensive Plunge- high risk if new system fails, only used if new system not vital to company operations
What does Moore's Law state?
Processor perfomance doubles every one and a half to two years
Why is the software business so profitable?
SaaS- getting paid like a subscription to use a piece of software
How do organizations use the cloud? What is SaaS? PaaS
SaaS- paid like a subscription to use a software PaaS- platform as a service, one access point, can access different platforms- used for software developers
Describe social engineering, phishing, spoofing, sniffing, and hacking
Social engineering- exploits psychology and has humans use a device for not their best interest, phishing- an email scam that looks real, spoofing- people think they are using a real website but its for phishing, sniffing- capture data as it is transmitted over a network, hacking- unauthorized access to data
What is spyware and malware and how can we protect against them
Spyware- tracks computer usage and sends data to someone, malware- programs like viruses, worms, trojans to disrupt computer programs, how to protect against them- antivirus software
How are <DIV>'s identified and styled?
The <div> tag defines a division or a section in an HTML document
Laying out HTML pages and the <DIV> tags
The <div> tag is nothing more than a container unit that encapsulates other page elements and divides the HTML document into sections. Web developers use <div> elements to group together HTML elements and apply CSS styles to many elements at once
Describe how data safeguards protect against security threats.
- define data policies - data rights and responsibilities - rights enforced by user accounts authenticated by passwords -backup and recovery procedures - physical security
Sources of threats to digital security
-Environmental and -Man Made --Human Error --Computer Crime
Organizing files in folders (components of the File Explorer including address bar, navigation pane) and naming files and folders (which characters are not allowed? What's an extension?
:*?"<> extension- a suffix for what the file is intended to be used for
What happened in 2006 that opened up Windows software to work on Mac hardware
Boot Camp assistant was released and officially supported Windows
Part of the computer (CPU, motherboard, removable circuit boards, cards, USB drives, etc)
CPU- central processing unit, "the brain", vary in speed, works with RAM motherboard- runs computer, process tasks removable circuit boards- circuits that control certain functions cards-expand capabilities of motherboard USB- solid storage
What is the entity-relationship data model? What is an entity? What is a one-to-many, many-to- many relationship?
Entity-tool for constructing data models , one to many- father:child, many to many- students and classes
How do you interact with a server? FTP
FileZilla
What are forms, reports, and queries?
Forms- provides a convenient means to enter or display one complete row of information in a range or table without scrolling horizontally, reports- analyzing data, provide process logic specific for a business need, enable processing via internet queries- request for data or information from a database table or combination of tables
Why is HTML so popular as a means of writing webpages?
HTML is an abbreviation for HyperText Markup Language and is used to structure your web page. plaintext
Examples of popular programming languages (HTML, Javascript, C/C++, Java, Python, C#, Visual Basic)
HTML, Javascript
Why develop systems?
Help make faster, more secure environments, resolve business problems
Private and public IP addresses. Who controls the IP addresses and how are they distributed?
ICANN controls them public- an IP address that can be accessed over the Internet private- is used to assign computers within your private space without letting them directly expose to the Internet
Difference between information technology and information system
IT uses IS the people in IS make a difference
Examples of famous open source operating system software running on mainframes and mid-range computers (Unix, Linux)
Linux, Unix, Firefox, Android, Apache, Ubuntu
Name of the first electronic airline reservation system.
Magnetronic Reservisor
What is the Internet of Things (IoT)? How can the IoT and other technological forces like smart devices disrupt traditional businesses?
everyday objects embedded with hardware capable of sensing, processing, and transmitting data
What are the principles of agile development methodologies
expect changes in requirements, deliver working version of the product, work closely with the customer, design and test as you go, team knows best, can be used for business processes, IS, and application development
What are the benefits of Moore's Law for businesses and technology
faster processors
Describe why DOS or DDOS attacks are difficult to defend against
floods a website with traffic so it can't work, dont need access to organizations server
Working with ranges in Excel
formulas>define name
Logical IF functions
formulas>logical>IF
Using formulas in Excel; how to enter formulas
fx button
Why are mobile devices so important? What are some key components (5 components of the IS) of mobile devices?
hardware, software, people, network, database able to take technology with us
What is an instruction set (Intel vs. Motorola, 32-bit vs. 64 bit)? Why can't certain software work on certain hardware? Mac software on Windows operating system
have to run on the same system
How to copy and move text efficiently and how to use the clipboard
highlight, right click, copy, paste
Mathematical and Financial formulas (e.g. SUM, MAX, MIN, PMT, etc)
home>auto sum PMT-periodic payment for a loan (rate, number of payments for loan, present value)
Using conditional formatting to highlight values
home>conditional formatting>highlight cell rules
Formatting numbers in Excel
home>numbers>general>more number formats>
Explain why systems development projects often fails and why it is so challenging?
improper/inefficient planning, lack of understanding of systems required, lack of support from top management, time factor, budget, human resources
What is the cloud? Why is the cloud architecture preferred to in-house hosting? What do we mean by elastic and pooled resources?
in house- developing info system inside the company (cheaper), don't have to worry about the maintenance, data loss problems cloud- always there, can access everything elastic- company will only pay for resources that it uses pooled- all together
Different types of apps. Popular business apps? Spreadsheets (Office productivity software- packaged or off-the-shelf vs. customized, in-house developed software)
in house- to be used within an organization off the shelf- developed by professionals customized- for a single organization
Using Charts in Excel; Modifying chart elements
insert>recommended charts
Different kinds of communication processors and what they are used for
interfaces to the host computer a number of networks peripheral devices- terminals, disk units, printers, and tape units
What is a computer network and how many kinds are there? How does an Intranet differ from the Internet?
intranet- accessible within boundary of the organization, WIFI network at UMD internet- network of the networks, secured network accessible within 1 kilometer computer network- multiple computers are connected to each other to share information and resources. (LAN, MAN, WAN)
What does open source mean? What are examples of "hidden costs" of open source software?
is a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose, open to public, others modify it hidden costs- design/testing fees
Data types allowed in Excel
labels, values, formulas
What is the difference between line and paragraph spacing?
line-the space between each line in a paragraph paragraph-space before or after paragraphs
Using Excel as a database and spreadsheet database functions (VLOOKUP)
lookup and retrieve data from a specific column in table (value, table, column number)
Peripherals, different types of storage devices (magnetic, optical, solid state drives), display devices (LCD)
magnetic- A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating optical- A technology that records data as light and dark spots on a CD, DVD, or other optical media. solid state drives- info stored in microchips
Basic computer architecture - CPU, primary memory, secondary memory, cache, RAM, bus, 32-bit vs. 64-bit, expansion ports etc.
main-contains operating system, too small to hold all code (RAM), can be sensed or changed secondary- (ROM) can be read but not erased or overwritten cache- stores frequently used data bus- data channel 64 bit- more expensive, hold more main memory expansion ports- port inside motherboard, hardware expansion can be connected
Using tables to analyze large amounts of data
make charts and graphs
Why use the outline view?
manage headings and arrange text
What is information? Why is it subjective?
meaningful truth that arises from the interpretation of data and association of the data with some specific entity, subjective because of interpretation
Why are image and audio files so large?
measured in pixels
How each of the computer component specifications are described (Megahertz vs. megabytes, Gigahertz vs. gigabytes, terabytes)
mega- one million giga- one billion bytes- used for disk capacities hertz- CPU speeds in cycles tera- one million million
What is a database? Definition?
multiple themes, A collection of information that might be stored in more than one file or in more than one record type
What is the difference between native and web applications (thin clients)? What are the advantages and disadvantages of web applications?
native- developed by pros only, high skill level required, high difficulty, costly web- Application software that is accessed and used from within a browser- temporarily downloaded on html pages- must have browser and internet connection
How the computer works (operating system, memory swapping)
operating system- Software that manages and coordinates activities on a computer and helps the computer perform essential tasks such as displaying information on the screen and saving data on disks memory swapping- moves chunks of data out of main memory
How do database applications make databases more useful?
organizes the data
How to create page breaks in Excel
page layout>breaks>page break
What is the concept of total cost of ownership of technology?
paying for testing/design fees
Understand how businesses use the systems development life cycle (SDLC). Understand the differences between all the phases - define the system (planning), determining requirements (analysis), design system components (design), create and test components (implementation), maintain and enhance the system (maintenance)
planning (interview stakeholders, review projects) -analysis (determine requirements and write report) -design (select hardware and software, identify potential solutions) -implementation (testing, train users, convert data) -maintenance (make backups, security upgrades), work breakdown structure (tasks in subdivisions)
Describe the goal of information systems security
protect info within a business, To find an appropriate trade-off between the risk of loss and the cost of safeguards
Describe how technical safeguards protect against security threats
protect with technology and policy procedures, - identification and authentication -encryption -firewalls -malware protection -design for secure applications
Why are database application programs needed?
provide process logic specific for a business need, enable processing via internet
What is a database management system (DBMS)?
read, insert, modify, delete data, Application software that assists the user in manipulating, storing, and maintaining database files
Absolute and relative addressing
relative- When copied across multiple cells, they change based on the relative position of rows and columns absolute-do not change when copied or filled
How is a data model transformed into a database design?
represent relationships
Save vs. Save-as
save- updates last version of work save as- rename file
What differentiates a client computer from a server computer? Why can't your laptop be used as a server computer?
server computer- large computer that manages access to a centralized resource or service on a network.
Why do you need a server to publish webpages?
servers store and serve web pages
Job opportunities as an MIS professional (nature of work), and describe typical job titles in the MIS field
software developer, web developer
Source code vs. object (machine) code
source code- human readable computer code object code: code complied into instructions executed by computers CPU software
Best ways of launching programs, getting to the desktop, and closing programs
start menu to open programs
How to search in Windows 10
start menu>search
Different kinds of functions in Excel (Statistical, Math & Trig, Logical, etc)
statistical- avg, mean median math/trig-When solving trigonometric expressions like sine, cosine and tangent, it is very important to realize that Excel uses radians, not degrees to perform these calculations! logical-As well as logical operators, Excel logical functions return either TRUE or FALSE when their arguments are evaluated.
What do business professional need to know about software?
storage, operating system, open source
What is SQL and why is it important to databases?
structured query language, A popular query language used by mainframes and microcomputers.
What is a style? What is a theme? What is a template?
style- is a collection of formatting instructions. You use styles to format the paragraphs in your document theme-colors, fonts, and effects template- refers to a sample document that has already some details in place
Explain the structure of the database table (byte-column-row
table or file column-fields rows-records byte-characters
What is virtualization? What is the advantage of virtualization?
the operating system for operating systems, create smaller parts of memory
Communication signals and how they are digitized and transported
transfer data point to point by copper wires, wireless, and optic fibers
What kinds of authentication systems work best
two-factor, strong passwords
Managing Windows settings, e.g. updates, PC settings, etc
updates- computer configuration>administrative templates>windows components>windows updates
Explain how scrum can overcome the problems of the SDLC
use alternatives (Rapid Application Development, Unified Process, Extreme programming, Scrum) use agile development methods
What are the components of a database application system?
user, database application, database management system, database
How to manage very long documents with multiple authors?
view>outlining
What is a VPN?
virtual private network- network extends a private network across a public network, and enables users to send and receive data across shared or public networks
Binary to decimal translation and vice versa
watch video
Matching computer specifications to processing requirements (desktop, mainframe, midsize, laptop, tablet computers)
what do you need the device for
What is a file path? How do you display a file path?
where a file is located
Basic networking, Internet as a WAN
wide area network, connects computers within a geographical area (ex: multiple branches in an organization)
Searching using search criteria. What is a wildcard search? What is a Boolean search
wildcard- A symbol that stands for one or more unspecified characters in the search criterion. Boolean- A word such as AND, OR, or NOT that lets you combine search criteria