MIS
Advantages of Data Warehouses
- Organized by dimension or subject: Data are organized by subject. This arrangement is different from transactional systems where data are organized by business process, such as order entry, inventory control or accounts receivable. This is beneficial because it allows it to remain organized and easily accessible to businesses and allows them to make informed decisions. - Using online analytical processing: Business transactions are processed online as soon as they happen. This allows for speed and efficiency which is critical to internet-based business operations. - Integrated: Data collected from multiple sources are organized by subject to remain easily accessible and easy to understand and interpret. This allows businesses to turn them into strategies easier. - Nonvolatile: No one can change or update the data. This allows for unbiasedness in the data and a sure-fire way to make sure that no one is tampering with the data so it is all true.
All of Friedman's flattners
1. Fall of Berlin Wall 2. Netscape switched from PC-based to Internet-based 3. Work-flow software 4. Uploading 5. Outsourcing 6. Offshoring 7. Supply-Chaining 8. Insourcing 9. In-forming 10. The steroids - virtual, digital, personal, mobile.
Expert systems do what?
Apply reasoning, knowledge, and expertise within a specific domain.
Which of the following is a flow of the supply chain? A. Virtual flows B. Information flows C. Report flows D. Human resources flows
B. Information Flows
Which of the following is not a component of hardware? A. primary and secondary storage B. the operating system C. input and output technologies D. central processing unit E. communication technologies
B. Operating System
Which of the following statements regarding informed users of IS and IT is true? A. Informed users almost invariably work for the IT department. B. Being an informed user is less important today than in the past because IT providers offer extensive help and support. C. Most employees who have experience surfing the Web or working with computers qualify as informed users. D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.
D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.
_____ occurs when the same data are stored in many places.
Data Redundancy
six network applications
Discovery - how computers are able to find other computers or devices on the network and if they can see it back. Communications - A set of nodes connected by communication links that allow for the transfer of information between users around the world. E-Learning - Education via the Internet by the use of applications and processes to learn. Virtual University - Provides higher education through online schooling allowing people to take classes from home to obtain a degree. Telecommuting - The Internet allows workers to save their commute and work from home, transmitting files and data from their own personal computers to the company.
How does IT affect society?
Employees have greater flexibility in terms of work hours and locations.
Two information systems that support the entire organization are:
Enterprise Resource Planning system (ERP) and Transaction Processing System (TPS)
Explicit knowledge vs Tactical knowledge
Explicit knowledge deals with more technical, objective and rational knowledge. a few examples are procedural guidelines, policies, reports, guidelines and the IT infrastructure. It is knowledge that can be documented in a form that can be distributed to others or turned into a strategy. Tactic knowledge is a cumulative store of subjective or experiential learning. It is never usually recorded and it is super personal to the salesperson or employee. Examples include an organization's insights, experiences, expertise and trade secrets. It also includes organizational culture. It is generally imprecise and costly to transfer.
ERP and TPS systems have separate systems for each department. T or F?
False!
Entering data and programs from user departments to the mainframe was called remote data entry. T or F?
False!
Functional area information systems are those that integrate all areas of the company. T or F?
False!
Master data are generated and captured by operational systems.
False!
Server farms can be located just about anywhere. T or F?
False!
The pricing model for infrastructure-as-a-service model offered by cloud computing providers is usually a per user fee. T or F?
False!
Information technology collects, processes, stores, analyzes, and disseminates information for a specific purpose. T or F?
False. That is Information Systems.
Porter's competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.
General Strategies, Activities
______________ provides cloud services based on security requirements.
Hybrid Cloud Computing
IT changes a middle manager's job in which of the following ways?
Increased number of employees reporting to a single manager and increased productivity
Benefits of grid computing
It makes it easier to scale up or down. It enables efficient use of computing resources. It enables applications to run faster. There is no single point of failure.
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
Knowledge Management
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.
Knowledge; Information
Organizational Responses to business pressures
Mass Customization, Strategic sytems
master vs transaction data
Master data includes data that is important to business applications that make up the IS, while transaction data are data that describes events that occur within the business. Master data is not volatile while transaction data is highly volatile. Master data is always involved with transaction data.
What is not a government regulation that puts pressure on businesses?
National Technology Act
_____ is a method for analyzing and reducing a relational database to its most streamlined form.
Normalization
What is a characteristic of effective business - IT alignment?
Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams
Sales and marketing professionals use IT for which functions?
Site Analysis and Promotion Anaylsis
Twisted Wire Pair
Slowest, most used, inexpensive, easy to work with
What are 2 IT components in CBIS?
Software and Database
What pressure do businesses face today?
Technology pressures such as information overload.
Friedman's Flattner's include
The development of work-flow software
A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services.
True!
An organization's supply chain starts at the supplier and ends at the customer. T or F?
True!
Cost Leadership Strategy is one strategy to gain a competitive advantage. T or F?
True!
Data marts are designed for the end-user needs in a strategic business unit or department.
True!
Extranets offer limited accessibility to the intranets of participating companies.
True!
Functional area information systems summarize data and prepare reports, and provide the major support for middle-level managers. T or F?
True!
If your computer loses its power supply, you will lose the contents of your random access memory, because it is volatile. T or F?
True!
In a service-oriented architecture (SOA) is web services can be reused across an organization in other applications. T or F?
True!
In addition to traditional IT jobs such as programmers and designers, many new jobs are available in areas such as e-commerce and network security. T or F?
True!
There are six (6) characteristics of effective Business-IT Alignment. T or F?
True!
Utility computing is also called on-demand computing. T or F?
True!
Web services description language (WSDL) is used to create XML documents.
True!
XML is a more powerful language than HTML.
True!
Tacit knowledge has which of the following characteristics?
Unstructured because it isn't recorded and is through experience
A(n) _____________ is a computer program designed to support a specific task or business process.
application
The part of a network that handles the major traffic is the ________.
backbone
Fiber-Optic Cable
consists of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers. The fiber-optic cable is surrounded by cladding, a coating that prevents the light from leaking out of the fiber. Smaller, lighter, most expensive, fastest, used for the backbone while others are used for individual devices.
strategies for competitive advantage
cost leadership differentiation innovation operational effectiveness customer-orientation
Data Hierarchy
data, information, knowledge, wisdom
Gordon Moore (with Moore's Law) predicted that microprocessor complexity would do which of the following?
double every two years
Ergonomics with affect employees by
eliminating some of the physical stresses experienced on the job.
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners.
extranet
Enabling groups to work together in ways that were not available previously is called
facilitating collaboration
Office automation systems
include report generators
According to Michael Porter, the Web ______ competition, which generally _________ a firm's profitability.
increases; decreases
IT affects middle managers by:
increasing their productivity
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
innovation
Coaxial Cable
insulated copper wire, less susceptible to electrical interference, carries more data, used for cable, more expensive, somewhat inflexible.
A database management system is primarily a(n) _____.
interface between application and a database
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks.
internet
_____ are Internet access points that are located in public places, such as libraries and airports.
internet kiosks
Secondary Storage
nonvolatile more cost effective than primary storage slower than primary storage
The main system control program is the _____.
operating system
With _____, every call opens up a dedicated circuit for the duration of the call.
plain old telephone service
Business environment pressures can come from
political changes Social factors Economic factors Legal factors
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.
protocols
A _____ sends messages through several connected LANs or to a wide-area network.
router
The digital divide is an example of which type of societal pressure?
social responsibility
The set of computer programs used to manage hardware resources is called:
systems software
The amount and type of memory that a computer possesses affects all the following except:
the speed of data entry
Porter's Five Forces
threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
Information-based industries are most susceptible to which one of Porter's five forces?
threat of substitute products
Mainframe
type of server
In a database, the primary key field is used to _____.
uniquely identify a record
The type of cloud used to build cloud infrastructure and applications for different businesses is called a ________ cloud.
vertical
Random access memory is _____ and _____.
volatile; temporary
Data Warehouse
A data warehouse is a repository of historical data that are organized by subject to help support an organizations decision making. They are also relatively expensive so they are used more so by larger corporations. They use online data processing where business transactions are processed online as soon as they occur. Collects data from multiple systems and integrates it together. They also store data for a long time, years even.
Which of the following items is an IT component of information systems? A. Procedures B. End users C. Software D. Management
C. Software
Which of the following is not a reason why managing information systems is a complex task? A. Information systems have strategic value to the organizations. B. Information systems are very expensive to acquire, operate, and maintain. C. The IS department "owns" the computing resources in a company. D. End users share the responsibility for the information systems with the IS department.
C. The IS department "owns" the computing resources in a company.
Which of the following is not considered a major capability of information systems? A. They provide fast, accurate communication and collaborations within and among organizations. B. They interpret vast amounts of data quickly and efficiently. C. They automate manual tasks but not semiautomatic business processes. D. They perform high-speed, high-volume, numerical computations.
C. They automate manual tasks but not semiautomatic business processes.
All of the following are cloud computing security issues except A. sensitive data access B. malicious insiders C. users technical ability D. privacy
C. Users Technical Ability
The executive in charge of the IS field is the:
CIO
Two strategies that a company can use to gain a competitive advantage are?
Customer-Orientation and Operational Effective Strategy.
All of the following are strategies for competitive advantage except: A. Differentiation. B. Innovation. C. Operational effectiveness. D. Customer leadership.
D. Customer leadership
peer-to-peer vs client/server
Peer-To-Peer processing has no central server and should be installed in homes and small businesses where people use them regularly. The point of it is to be inexpensive for those who only need it for a small use. Client/server computing can become as large as it needs to be without sacrificing any of its performance and it has a centralized security server that protects it.
What is a negative societal effect of IT?
Places employees on constant call
The cloud service in which customers rent servers and operating systems over the Internet is called:
Platform as a service
When data are normalized, attributes in the table depend only on the _____.
Primary Key
According to Porter's Value Chain Model, what are considered support activities?
Product and Technology Development Procurement
What statement about IT's role in society is false?
Robots can handle unfamiliar situations
Many organizations have implemented corporate portals to...
To cut costs To free up time for busy managers To improve profitability To offer customers self-service opportunities
Which of the following is not a concern or risk of cloud computing?
Training
Ergonomics
a science that deals with designing and arranging things so that people can use them easily and safely