Information Management Systems

Ace your homework & exams now with Quizwiz!

What is meant by a 2-in-1 computer system?

A 2-in-1 computer system is a laptop that can be used as a tablet.

True or False. The great advancement in information technology is due to the development in information systems.

False - Information systems rely on current information technology.

True or False. Two disadvantages of information technology management are time and cost.

False - Information technology can do things faster and more accurately than people can; in the long run, with good IT management, businesses are able to save time and money.

Best practices

Knowledge management systems are most effective when best practices are maintained and readily available to employees and managers whenever needed. This will help improve the organization's overall performance.

Computing has changed significantly in the last few decades. Select the best choice for chronological evolution of computing in business.

Mainframe, minicomputers, microcomputers

Organizations are complex and have many similarities and differences. Having a motivated and knowledgeable team can make a business run smoothly and keep managers aware of what is happening at all levels and in all areas of the organization. Pick the most accurate statement below regarding managers.

Managers must understand the essential features of their organization to build and use information systems successfully. Having a knowledgeable and supportive staff would also be helpful so that they have someone who can answer questions or to consult with when problems arise.

Accounting and Finance

Managing financial assets and maintaining financial records

Information Management

The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision making.

What is knowledge management?

The process of sharing knowledge across business units and amongst employees of a business

Software

The programs comprised of pre-coded instructions written in a programming language which the end user typically uses to interact directly with the IS.

OLTP (online transaction processing)

and is a database design used for browsing and manipulating business transaction activity.

Object-oriented programming (OOP) languages

are based on objects and data, rather than logical procedures and actions.

Associations

are data that are linked to a specific event, such as how frequently customers purchase jelly when they purchase peanut butter.

Sequences

are events that take place in a specific order, like a customer purchasing a GPS device after purchasing an automobile. One event or transaction takes place before the other.

WANs (wide area networks)

are interconnected through the Internet using IP protocol, or through private networks and even through the POTS, the plain old telephone system.

Relational Database

are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships, in rows and columns.

Java and C++

are programming languages in use today.

Analytical platforms

are purpose-built appliance systems that are designed to process and analyze enormous amounts of data quickly.

Web developers

are responsible for creating and maintaining a company's website. This includes layout design, programming, and website usability studies.

Information security analysts

are responsible for the security of a company's network, data, and information. Security analysts must determine where a company might be vulnerable to a cyber attack and install or recommend protection against these threats, such as firewalls, data encryption programs, and changes to training or operational policy.

Attributes

are the properties of the data components.

Multidimensional databases

are typically relational databases that store data in a cube, which contains aggregated data related to all dimensions and allow businesses to visualize data assets in multidimensions to see what is happening in real time.

The data auditing function

audits the users of the company's database.

Management information systems focus on technology, people, and organizations. They primarily serve _______.

first level managers

information policy administration

function develops the rules to solicit, collect, process, distribute, and store information in an organization.

The database administration

function is responsible for creating and managing the whole database management system.

Predictive analytics

looks for patterns in past data to predict the future, thereby positioning businesses for opportunities or to avoid risks.

Businesses invest in information systems for a number of reasons. What are some of the reasons

- Achieve operational excellence - Develop new products and services - Attain customer intimacy and service - Improve decision making - Promote competitive advantage - Ensure long-term survival - Develop strong relationships with suppliers

Information systems simplify business processes and remove unnecessary activities. What are some of the direct benefits?

-Eliminating repetitive tasks -Increasing accuracy -Project planning and implementation

Information systems are used in many functional business areas, the most common being:

-Human Resources -Marketing -Accounting

Five competitive forces

-Threat of new entrants -Threat of Substitute products or services -Bargaining Power of Customers (Buyers) -Bargaining Power of suppliers -Intensity of Competitive Rivalry

Two types of business strategies

-product differentiation -growth

A large part of IS management's main agenda changes every ______ year(s) due to the constant evolvement of information systems, confirming the highly dynamic nature of the IS management function.

3 - About one third of the IS management agenda is expected to change every three years, confirming the highly dynamic nature of the IS management function.

Which of the following is an example of a business or entrepreneur utilizing a customer relationship management (CRM) system?

A chain of three pizza restaurants utilizing a web-based software that keeps track of customer email addresses and uses that system to send out weekly coupons

Table

A collection of related records. For example, a set of customer records would all be contained in one table.

Foreign Key

A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table.

Centralized Database

A database located at a single site.

What is the difference between a dumb terminal and a client?

A dumb terminal is for input and output, while a client can also process instructions.

Primary Key

A field that uniquely identifies a record, such as customer ID or student ID.

Grid computing

A form of supercomputer constructed from many smaller systems that have been connected together

What is the difference between an analog signal and a digital signal?

Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms.

Network

A group of two or more computers and other devices connected to each other.

Mainframe

A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.

One key role of a system administrator is to _____________.

A key role of a system administrator is to maintain and update computer systems.

peer-to-peer topology

A peer-to-peer topology allows file sharing between computers. Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.

Entity

A person, item, event, etc., for which an organization collects data. An example of an entity would be customer or student.

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet.

Post Office Protocol (POP)

A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol, and can be used with or without SMTP.

What is the difference between a dual core and quad core chip?

A quad core offers more power, allowing more multitasking capabilities.

Infrastructure as a service (IaaS)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.

Platform as a service (PaaS)

A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.

Master Data

A set of core data, such as customer, product, employee, vendor, geographic location, and so on, that spans an enterprise's information systems.

Record

A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.

bug

A software defect is known as a bug.

Virtual computing

A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.

Partitioning

A typical relational data warehouse is made up of indexed tables that can be implemented using a partitioned approach. Relational data warehouses benefit from partitioning the data as part of implementation and maintenance.

Risk Acceptance

Accepting that a risk will occur and doing nothing to avoid or prevent it. An example would be accepting that a baseball will pass through a window facing the park and planning to replace the window when it occurs.

What is a key advantage in business in having a web-based database rather than a client-server traditional database?

Access from anywhere

Risk Reduction

Acting to reduce the potential for a risk to occur or affect damage to the project. An example would be the installation of a pre-action fire suppression system to protect sensitive electronics, where non-reactive gas is used to smother a fire before a traditional water suppression system is activated.

Bluetooth

Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves

SCM System

An SCM system is one in which businesses are interconnected and work to create a product or service for the customer.

Field

An attribute of an entity, such as name, address, or student ID.

PSTN (Public Switched Telephone Network)

An international telephone system that carries analog voice data.

Operating System

An operating system manages the activities of the computer.

Application Software

Applications software includes programs such as database, word processing, presentation, web browsers, and spreadsheets. It is a set of programs that helps the user perform functions, tasks, or activities.

In a project, which of the following best describes risk management?

Assessing and acknowledging unknown factors

central processing unit (CPU)

Brain of the computer that performs instructions defined by software

The ___________ is in charge of the people who design, build, use, and manage information technology in the organization.

CIO - The CIO focuses on the people and technology needed to run a company.

CRM systems

CRM systems entail all aspects of interaction that a company has with its customers. These systems are used to organize customer information.

Cache and on-board memory

Cache and on-board memory are high-speed memory and are considered primary storage since they are internal and easily accessed by the CPU

The software that enables users to access the cloud is known as cloud fabric. What is the title of the cloud fabric person who monitors and provides cloud resources to users?

Cloud Fabric Controller

Computer networks enable circuit switching. What does this mean?

Computer networks create a point-to-point packet digital circuit in circuit switching, which allows point-to-point communication.

Computer Software

Computer programmers create software programs to make computers execute tasks; this includes the operating system and applications on a computer.

Two factors that have contributed to the globalization of business are the availability of inexpensive communication and improved transportation. These factors have also contributed to the creation of a common global ________________.

Culture

Enterprise resource planning systems typically utilize one _______________.

Database. Enterprise resource planning systems typically utilize one database to store all the information needed by the various business units. This allows for consistency within the business.

Database Normalization

Databases must go through normalization in the design process to simplify complexity where possible and remove redundancy between elements.

Risk Avoidance

Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category. For example, finding a path around traffic congestion might include taking surface roads versus the expressway during rush-hour traffic.

Disruptive Technology

Disruptive technology is usually cheaper and not as capable as established products before they emerge as leading options.

Thousands of fields use information technology to boost effectiveness. The need for healthcare is especially important to everyone, and technology has helped the medical field meet the demand. Of the items listed below, select the primary growing benefit of information technology to the healthcare industry.

E-learning has become very popular in the medical field to help support the healthcare demand and supply the field with the necessary workers more quickly through the use of information technology.

Enterprise Resource Planning (ERP) Systems

ERP systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system.

ETL (extraction, transformation, and loading)

ETL refers to the process of data identification, consolidation and scrubbing, formatting, and transferring to the target data warehouse.

Which of the following examples represents a one-to-one type of relationship between entities?

Each person has a social security number.

What is a benefit of introducing knowledge management?

Employees of a business more readily share information across business units.

True or False. A retail company such as Amazon.com uses DBMS to discover customers' past spending trends and to predict future shopping behaviors.

False - A company such as Amazon.com collects a lot of data every day. The amount of data collected is so huge that they cannot be managed or mined by a DBMS.

True or False. For referential integrity to be enforced in a relational database, a primary key does not need a corresponding entry of equal value in the referenced table.

False - A row value or primary key in a table only exists if an item with an equal value (foreign key) exists in a referenced table.

True or False. There is considerable organizational resistance to implementing new information systems because they change many important organizational dimensions, such as culture, structure, politics, and information technology.

False - Although information technology is a subset of information systems, it is not an organizational dimension that would cause organizational resistance to information systems.

True or False. There are four major business functions: sales and marketing; production and operations; finance and accounting; and technology and systems.

False - Although technology provides support for all of these areas and is a component of information systems, it is not a functional area.

True or False. Analytic applications are a type of operating system that are used to measure and improve business performance.

False - Analytic applications are a type of application, not an operating system; they are used to measure and improve business performance.

True or False. Although information technology has increased the speed and number of processes that can be completed, it poses no risk to any employee's job because there is more IT to manage.

False - Because information technology has increased the speed and number of processes that can be completed, some employees may worry that they could be replaced by a computer. Managing information technology advances can be challenging for the employer because of employee resistance to change and the possibility of job loss.

True or False. Computer hardware refers to all the inner components of a computer.

False - Computer hardware is not just the inner components of a computer. It includes external components as well such as the monitor, mouse, keyboard, etc.

True or False. You are a database administrator maintaining the company system. As part of your work, you scrub data. Data scrubbing is the process of detecting bad records from a database, but it does not remove them.

False - Data scrubbing checks for data consistency; it will check, fix corrupted records, and remove bad records from the database.

True or False. If a student decides to switch classes because she wants a different teacher, this would be considered a transaction to the college's information system but would not involve any interaction with its accounting or human resources systems.

False - Even though no money is exchanged, this simple transaction might impact student fees, faculty schedules, or classroom availability.

True or False. Information technology and the systems they serve impact every facet of our lives. However, to use information technology efficiently and benefit from all its features, you must have a degree in the subject area and work in the IT field.

False - Everyone is impacted by IT in some way every day and can learn it easily on the job or by taking a few courses, without having a degree in the field. Technology is getting easier to use, and training is readily available for those who want it.

True or False. One benefit of a supply chain management system is for U.S. businesses to lower costs by relocating their operations to cheaper, overseas locations.

False - Implementing SCM systems helps businesses lower their costs by reducing waste, overhead costs, and shipping delays. The benefits of lowering those costs can help improve product quality and order turnaround times.

True or False. An organization's information policies are formally and officially developed by the IT department.

False - Information policies are not developed formally and officially by the IT department alone. They are often enforced by IT and/or HR, and shaped by organizational culture, in both formal and informal forms. For instance, the information policies at a public university can be quite different from that of a private university with religious affiliations.

True or False. Differences in language, culture, and technology do not present a challenge for a company implementing a global information system.

False - Language, culture, and technology can be huge challenges when implementing global information systems.

True or False. Laptops and desktops come only with dual core CPUs, while server computers come only with quad core.

False - Laptops, desktops, and servers can have any type of CPU; it is a buyer selection option.

True or False. You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?

False - Large business might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.

True or False. Because a lot of free software is available, managing software licenses is not a concern for modern organizations.

False - Managing software licenses is a concern for modern organizations because licenses usually have expiration dates or limited downloads and the free software is more limited in capability.

True or False. In contrast to big data analysis, data analytics can only be used to directly influence small changes in our lives, such as turning on the coffee maker and the oven at home.

False - Many applications use data analytics to directly influence small changes, such as when to turn on the air conditioner, to when to change the stoplight pattern in a large city, to coordinating emergency services during emergency situations, to studying enormous issues such as cancer research or climate change.

True or False. Auditors will conduct a data quality audit only if there are concerns that the data violates any of the data integrity rules.

False - Monitoring and maintaining the data integrity of a database is a formal and on-going process.

True or False. Data integrity in an online retail website such as L. L. Bean or Lands' End will not be affected if customers continue to modify an online order after they have submitted and fulfilled their purchases.

False - Once an online order is submitted and paid for, customers are not allowed to modify the orders without violating the data integrity of the database or data warehouse.

True or False. Data are more secure when they are stored in the cloud.

False - One of the biggest challenges of information technology management is cloud technology and the ability to protect the data from security threats.

True or False. Once a company has purchased proprietary software, there is usually no additional cost to allow other employees to download and use the software.

False - Proprietary software is purchased by a license, which usually has an expiration or renewal date and download limits.

True or False. Software as a service is an example of software that is loaded on existing hardware.

False - Software as a service (SaaS) is proprietary software that is stored in the cloud and can be accessed by users who have a license.

True or False. The Separation of Duties Policy is an information policy that restricts users' access to the company's database.

False - The Separation of Duties Policy is an information policy developed to separate the roles of the data creator from the roles of the data user. For instance, a data creator could be someone from the IT department while a data user could be an order taker.

True or False. The amount of organizational oversight is not dependent on the centralized or decentralized nature of the global business type.

False - The amount of organizational oversight is dependent on the centralized or decentralized nature of the global business type.

True or False: Carly's Consignment shop keeps track of sales at the cash register and then downloads them into two spreadsheets at the end of the week to verify inventory sold and to calculate profits. This is an example of sales that are processed and tracked digitally in a database management system.

False - The processed sales orders are stored on the computer or Internet in an electronic format, but using spreadsheets is not the same as a database management system since it cannot process queries for Carly.

True or False: Consider how your doctor's office creates, organizes, and stores your medical information. They might be stored digitally or in paper form. Medical records kept in a doctor's file cabinet file is an example of the old traditional file environment, but is just as efficient as those stored in a database management system, so there is no need to convert to a DBMS.

False - When documents are stored in a file cabinet, it is considered a non-digital form of storage medium. Therefore, it resembles the traditional file environment and is much slower and less efficient to store data and share digitally. However, the office manager can easily create a database using Microsoft Access and convert the traditional file environment into a DBMS.

True or False. Software requirements have no impact on hardware purchases.

False - When purchasing new computer hardware, you should match software requirements with hardware capabilities to make sure it is capable of running the new software.

True or False. Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked dependently.

False - When several businesses combine their expertise, they can offer better products for lower costs and higher profits. Their combined effect is greater than if they worked independently.

The European Union Data Protection Directive (1998) restricts the transfer of personal information from participating nations into other nations that do not maintain the same information privacy standards. Which industry would be the most affected by this law?

Financial services

Managing information systems is a challenging role because of the constant changes and threats to computer based information systems. Which of the following can be a major threat to information systems?

Floods, earthquakes, power outages and more are major threats to managing information systems.

Production and operations

Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance

________________ is/are making technology and information more difficult to manage because the barriers of language and geography have been broken down.

Globalization

Before selecting software applications, what requirements need to be reviewed?

Hardware - All software applications have processing, memory, and storage; or hardware requirements.

The IS function is _________ in structure and its success depends on its cooperation and relationship with the other functions in an organization.

Horizontal - Because information systems encompass many different business functions in an organization, the IS function is horizontal in nature and cannot work alone in a vertical structure.

Horizontal Applications

Horizontal applications are more popular and general purpose, such as word processing, spreadsheets, and presentation software.

Which main business function is responsible for maintaining employee records?

Human resources - HR responsibilities include payroll, benefits, hiring, firing, and maintaining employee records.

What company's computer popularized the term PC?

IBM

Globalization

IT has brought the world closer together and made the world's economy a single interdependent system.

___________ have shown tremendous growth in the last few decades, leading to more sophisticated _____________ .

Information technologies ; Information systems Information technology is seeing constant changes with faster processors and smaller devices. Information systems are more sophisticated because of the advancements in information technology.

Why has information technology become critical to the success of business enterprise in the last 20 years?

Information technology has automated business operations and changed the economics of information.

Cost Effectiveness

Information technology has helped to computerize businesses to streamline processes that increases productivity and profits.

More time

Information technology helps eliminate repetitive tasks and increases accuracy, allowing employees to concentrate on more high-level functions.

Product development

Information technology helps ensure quality new products reach the market faster and to more customers and suppliers.

What are the basic operations in the information processing cycle that hardware operates and that every computer performs?

Input, output, process, and storage

What are the two fastest growing trends in MIS that are impacting IT careers?

Mobile platforms for consumer and business applications are driving the need to move data to the cloud.

In which type of organization would information system development appear to follow the sun, with development occurring on projects until such time as the work might be handed off to the next division or location as their day ended?

Multinational

Object Database

Object databases are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD)1 are more complex and not easily sorted by columns and rows.

Information systems support an organization's many functional business areas. These functional areas can be grouped into what two main categories?

Operations and management - Operations and management use information systems to support a company's business functions. Business management involves working with people and creating an environment to effectively achieve organizational objectives. Business operations involve all the daily activities conducted for the purpose of generating profits.

Risk Sharing

Partnering with groups or individuals who have more experience and who will accept or absorb some or all of the risk involved. For example, when planning a community event, partners are often sought to help sponsor a venue or service in order to reduce financial risk.

Six components of a computer-based information system

People ; Processes; Networks; Software; Hardware; Data

Marketing and Sales

Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization

In computer science, of what two classes is storage composed?

Primary and secondary

RAM

RAM is a primary storage device that holds data, applications, instructions, and the operating system while the computer is on. ROM helps manage the operation of the computer hardware on bootup.

Human Resources

Recruiting, training, and maintaining employees and their records

Information systems executives must make difficult hardware decisions regarding _______ issues that pose possible outside threats to the system.

Security

On premises (private cloud)

Services are provided in-house on servers or in a data center owned, managed, and administered by the organization.

Risk Transference

Shifting risk to another party. For example, in a case where risk cannot be avoided, shared, or reduced to an acceptable non-damaging level, insurance can be purchased to provide restorative reimbursement for damaged equipment or services and, potentially, lost revenue.

True or False. With such a variety of uses for computers, choosing what hardware and software to purchase can be difficult. It is important to consider the software being used, before choosing what computer to purchase.

Software applications require certain memory, processing power, and storage space, so hardware requirements must be considered.

Software Life cycle

Software has a life cycle and often becomes outdated after a period of time. Microsoft Windows is an example of software having a life cycle. Once Microsoft offers a newer version of Windows, they only offer support for the previous version for a limited period of time.

Software as a service (SaaS)

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.

A system where businesses work together to create a product or service for a customer is called a ____________

Supply Chain Management System A supply chain management system is one in which businesses are interconnected and working to create a product or service for the customer.

A four-level pyramid depicts different types of information systems, as they relate to different hierarchical levels within an organization. Select the correct ascending ordered list of four systems (i.e., bottom to top of the pyramid), that relates to the end users' increasing hierarchical level within an organization.

TPS, MIS, DSS, EIS

What best describes the implications of the Internet of Things?

The Internet of Things (IoT) will make all devices and systems "smart" so they will be able to communicate via the Internet to automate servicing needs.

Convergence

The ability for a telecommunication network to carry voice, data, and video

What is virtualization in computer system infrastructure?

The act of virtualization creates a virtual environment in a host computer to save space, reduce costs, and provide a safe test environment.

Schema

The complete definition of a database, including the tables, records, fields, and relationships.

Hardware

The computer and all of its peripherals

People

The information system professionals and users.

Data inconsistency

This happens when the same attribute has different values when the data is stored in more than one location. For instance, the data format and data type of the address field could possibly affect the values of the data stored in the database.

System on a Chip (SoC)

This is a single chip containing all the computer circuits an embedded device such as a microwave needs to control it.

Management information systems (MIS)

This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly.

Decision-support systems (DSS)

This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision-making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends.

Executive information systems (EIS)

This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends.

Transaction processing systems (TPS)

This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing.

Supercomputer

This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind.

True or False. Information is data that have been organized to provide value to an organization.

True

True or False. A risk mitigation activity in project management is implementing a "lessons learned" process after each project.

True - A "lessons learned" activity at the end of each project prepares project managers for future projects.

True or False. A real estate company has a website that is integrated with a software system that keeps track of all the realtor's sales leads and listing information. The system keeps track of each person's name and contact information. This software system is an example of a customer relationship management system.

True - A CRM system is a system that contains all information related to a business's customer.

True or False. There are many uses for geographic information systems (GIS) in business to help solve problems. For example, a GIS can help county administrators decide when and where to build a new high school.

True - A Geographic Information System can help county administrators understand population density changes and demographic trends and decide when a new high school is needed to accommodate the growing youth population.

True or False. A core competency is an activity for which a business is a marketplace leader.

True - A core competency is an activity for which a business is a marketplace leader.

True or False. A web developer is responsible for designing and coding the website to allow users to engage and navigate website information and services.

True - A web developer focuses on all aspects of the website design.

True or False. Assume you are responsible for a programming team and are defining low-level programming to a group of marketing employees. One of the marketing employees says, "Low-level programming software consists of machine language instructions while high-level programming software are closer to natural language and are easier for humans." Is this true or false?

True - All software is compiled to a machine language, and therefore machine language is a low-level programming code, while humans need high-level programming software for ease in coding.

True or False. One benefit of a supply chain management system is to plan daily operations of the company.

True - Although most people know supply chain management as the systems used to manage the flow of products or information into consumer's hands, it also helps with planning daily operations, improving sales forecasting, predicting transportation requirements, building partnerships, and improving business strategies, among other things.

True or False. The most common client-level operating system installed on PCs is Microsoft Windows.

True - Approximately 90 percent of PCs use a version of Microsoft Windows as the operating system.

True or False. Data integrity in a customer database can be maintained by allowing users to add, but not delete, data or fields from the database and assigning security permissions.

True - By assigning security permissions, you can limit the risks to destruction of the data by allowing users to add, but not delete, data from the customer database.

True or False. Online retailers such as Amazon and eBay use clickstream analysis to identify customers' browsing and shopping habits so they are able to market other similar products to their customers.

True - Clickstream refers to the recording of clicks that a user made while browsing on the Internet. Clickstream analysis will identify user's activities on the Internet.

True or False. One of the benefits of cloud computing is the ability to create a virtual organization.

True - Cloud computing enables an organization to become "virtual" because the programs and data can be easily shared regardless of a user's physical location.

True or False. Implementing information systems within an organization should be carefully considered. It can be quite costly, but the long-term benefits can be even greater.

True - Costs include installation of the systems, as well as employee training, but long-term benefits should be greater.

True or False. Title II of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 impacted medical data governance by requiring national standards for electronic healthcare transactions. The main purpose of data governance is to maximize data quality through effective utilization, availability, and protection of data and information.

True - Data governance is concerned with the management of data, including maximizing quality through effective utilization, availability, integrity, and protection.

True or False. When designing websites for online retailers, it's important to enforce format rules and data collection procedures to ensure data integrity and improve data consistency when shoppers input their personal information and orders on the Internet.

True - Data governance is important in business because it helps address challenges in managing data. Data can be input more consistently by using the same descriptions, standards, units of measurement, and format.

True or False: Data mining is used by businesses to analyze internal factors in order to improve business performance.

True - Data mining is primarily an analysis of internal business data.

True or False. Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.

True - Data packet switching can be broken up and sent throughout the entire network to be reassembled at the destination.

True or False. If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a multiplexer.

True - Data signals travelling over computer networks are combined together by the use of a multiplexer.

True or False. The political climate in a country can have an impact on globalization.

True - Globalization can be defined as the integration of international economies, and it does benefit from general political stability around the globe.

True or False. Unlike SCM and CRM installed on business servers, health analytics tools are applications installed on smartphones, so they cannot identify event sequencing, classify patterns, cluster similar records, or predict future outcomes.

True - Health analytics tools are usually apps created for smartphones or portable devices to keep track of the device owner's health and exercising stats, and they have limited capabilities.

True or False. Even though information technology functions in the background, it is the backbone of most organizations.

True - If any piece of the IT system fails, an organization loses its effectiveness.

True or False. One challenge of introducing knowledge management is that employees are often not willing to share information that they perceive gives them unique value to a business.

True - Many employees believe that the knowledge they have should be kept a secret to avoid too many people knowing how to do their job. This is a challenge for any business looking to implement knowledge management into the company culture.

True or False. Integrated circuits consist of sets of electronic circuits on a chip or plate of semiconductor material and replaced vacuum tubes.

True - Old electronic computers were powered by vacuum tubes until the invention of the integrated circuit.

True or False. Relational database systems give organizations the ability to analyze data to make better and faster managerial decisions.

True - One key benefit to databases is that they provide businesses an ability to perform data analytics.

True or False. One of the advantages of information systems for businesses is to take raw data and turn them into valuable information, and then help transform that information into organizational knowledge.

True - Organizational knowledge is the result of people using systems to generate, manage, and use information to achieve organizational goals.

True or False. Predictive analytics is used by businesses to predict trends or behaviors from customers.

True - Predictive analytics is a process in data mining that attempts to deduce what might happen in the future.

True or false. The decision to outsource or go offshore with a project is based on a lack of core competencies inside the business or where there is financial savings in labor cost.

True - Project managers choose to outsource when it lacks resources or expertise, and offshoring is chosen to reduce cost.

True or False. The Los Angeles Police Department has purchased an application software package to prepare negotiators to learn how to communicate with suspects in hostage situations. This is an example of a simulation application software package.

True - Simulation software simulates actual systems and is typically used for training, entertainment, or research. The Los Angeles Police Department has purchased a simulation application software package to prepare negotiators in how to communicate with suspects in hostage situations.

True or False. Wireless handheld computer devices have dramatically increased worker productivity because it allows communication and access to information without landline connections.

True - Smart, wireless computing devices allow staff to work anywhere and access enterprise information and applications from anywhere, increasing worker productivity.

True or False. Software programs have minimum speed and memory requirements.

True - Software programs have both minimum memory and speed requirements for the hardware on which they will be installed.

True or False. Sentiment analysis is a software tool that businesses can use on the Internet to examine and obtain opinionated information collected from social media websites.

True - Sometimes also known as opinion mining, sentiment analysis is used to analyze textual databases, or that which contain text resources, such as social media messages and email. It uses natural language processing, text analysis, and computational linguistics to examine and obtain information.

True or False. Information technology has increased the speed and volume of information that can be communicated within and between businesses, and managing this information has become very challenging.

True - Technology and communications development have partnered hand in hand for centuries, and as technology evolves, communication techniques advance to new levels.

True or False. The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes.

True - The earliest computers took up entire rooms and consisted of vacuum tubes for transistors.

True of False. One of the most important IS management issues facing businesses today is hiring skilled IS workers

True - The modern IS management function is extremely complex and changes regularly. Finding qualified employees is critical to maintaining an effective IS.

True or False. One management solution for addressing the challenges posed by implementing a global information system is to outsource the project to an offshore company that has global information system development expertise.

True - There are many advantages to outsourcing, which include cost and time savings, access to skilled resources, and better services.

True or False. An information technology manager should seek to standardize software and hardware when developing a global information system for an organization.

True - To reduce challenges with global system development, it is wise to standardize software and hardware to avoid compatibility issues.

True or False. One of the challenges in today's IT advances is the development of varying screen display sizes for computer monitors, tablets, smartphones, and PDAs.

True - Web programmers are consistently being challenged by the numerous changes in screen sizes, and how to appropriately handle this change in their coding and development.

True or False. Companies, such as 24x7 help desk operations, use centralized information systems, in which work occurs on projects until such time as the work might be handed off to the next division or location as their day ended. When a client calls or continues a help desk call, the next group can pick up the call without any break in the work flow.

True - With centralized development, the same systems are found at foreign locations and are designed and developed, then passed to each foreign location for normal operations.

True or False. The benefit of having multiple locations working on the same development project is that work does not need to stop when the workday ends.

True - With multiple locations working on the same development project, in many different locations and time zones, the work does not need to stop when the workday ends.

OLAP (online analytical processing)

and are analytical, fixed databases containing data that are used for making decisions.

How is voice or video information carried on digital networks?

Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.

Forecasting

analyzes a series of values in order to predict or forecast the value of other variables. An example would be a utility company analyzing weather patterns in order to predict energy consumption on a given day.

Network-based Strategy

When three businesses work together as a cohesive team on projects and also pass business to each other, the businesses have created a network-based strategy among themselves.

Customer Relationship Management (CRM)

analyzes the company's big data to identify associations, correlations, and relationships among customer variables.

Wi-Fi

Wireless local area network that uses radio signals to transmit data

Communication

With the help of information technology, video conferencing has become cheaper, quicker, more collaborative, and more efficient.

peripheral device

a component, such as a monitor or keyboard, that connects to the computer through data port

Distributed Data

a distributed database may be stored in multiple computers.

product differentiation

a positioning strategy that some firms use to distinguish their products from those of competitors

vertical application

a type of application software that is designed for a very limited purpose in a field or business - example Accounting software

Database administrators (DBA)

build databases to store data to meet business needs. This is a growing profession because data are a tremendous business asset. The DBA designs the databases, ensures that the databases operate efficiently, maintains data security, and applies upgrades as needed.

Transmission Control Protocol/Internet Protocol (TCP/IP)

can be shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.

Clustering

classifies events or entities when no known group exists for the data.

A project manager is responsible for _________________.

communicating the project plan

asynchronous communication

communication such as email in which the message and the response do not occur at the same time

synchronous communication

communications that occur at the same time such as IM or chat

Input

components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Output

components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

Textual databases

contain text resources, such as social media messages and email, and are mined for sentiment analysis.

data mart

contains a subset of data warehouse information

logical data models

contains more detail than a conceptual data model, often defining operational and transactional entities for the database.

Consolidation algorithm

correlates the data with the data warehouse format.

Web mining

creates databases which are mined to understand customer behavior and improve customer intimacy.

Information systems accept ______ as input and process it into ______ as output

data ; information. Raw data are input into a system and then processed for output. Information is data that have been organized to provide value.

Decision trees

data mining methodology, which generate rules and classify data sets.

Data dictionary

defines and manages the data types and structures that dictate how the database is organized.

Internet of Things

describes a system in which everyday objects are connected to the internet and in turn are able to communicate information throughout an interconnected system

Radio frequency identification (RFID)

enables a company to track merchandise or inventory by radio frequency signals, eliminating the need to physically handle each item during the inventory process.

PPP (Point-to-Point Protocol)

encryption is used to ensure the privacy of the content being communicated.

Chief Technology Officer (CTO)

has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. The CTO's focus is on day-to-day operations, overall implementation of technology strategies, and efficiency of the IT systems. In most corporations, the CTO reports to the CIO.

data packets

have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.

Vertical Partitioning

in relational database deals with columns, not rows.

horizontal partitioning

in relational database deals with rows, not columns.

POP stands for Post Office Protocol

in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.

Carrie works for a software company and is in charge of communicating with the clients about their business needs pertaining to their software. Carrie helps her clients identify and describe their business needs in such a way that the software development team can take that information and turn it into a useful piece of the software system. Carrie plays an important role in the __________________ function of her company.

information management

Keith works at a software company and is in charge of the computer server room. He is also in charge of keeping track of which employees have certain computers and monitors and other various technology associated with their roles. Keith plays a key role in the ______________________ function of his company.

information technology management

Classifications

look for patterns that indicate customer or entity behavior in order to target marketing efforts.

Network and computer system administrators

install and repair computer systems, as well as identify and fix network issues. These IT professionals ensure a company's web pages are loading and emails were sent. Examples of professionals in this role might be server administrators, email administrators, capacity analysts, and network analysts. Network engineers design the system's network configuration.

A customer relationship management system provides a business with the opportunity to:

integrate information about each client's likes and dislikes to be able to tailor conversations with them.

Hadoop

is a Java-based open programming framework that supports big data collection, processing, and analytics of a distributed computing environment.

Chief Information Officer (CIO)

is a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects.

A relational DBMS

is a collection of files (tables) that are organized by columns (fields) and rows (records).

A network host

is a computer or a physical node, with an Internet Protocol (IP) address connected to a network.

A service level agreement (SLA)

is a formal contract between a customer and the service provider detailing the level of service expected from the provider. A software package is a prewritten set of software programs that performs a specific business function, such as accounting or order management.

Hyper Text Markup Language (HTML)

is a markup language used to create web pages.

Voice over Internet Protocol (VoIP)

is a modern telecommunications technology that offers convergence between voice and data networks. VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet. VoIP has rapidly replaced telephone voice traffic.

Data quality audit

is a process to determine the reliability, completeness, and accuracy of the data in a database.

Integrated Development Environment (IDE)

is a programming environment that provides tools to developers to write code.

Java

is a programming language and platform used by many applications and websites that allows users to play games and communicate

SQL (Structured Query Language)

is a programming language designed for communicating with a database.

Near Field Communication (NFC)

is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other. Paying for purchases by waving a smartphone over a credit card reader is an example of NFC.

A mashup

is a software application that allows users to mix and match software components in order to create a customized application.

Information System

is a system that accepts input data and processes it into information as output.

A flat file

is a type of database model that resembles file cabinet functionality.

Hierarchical

is a type of database that connects tables in a leader/follower or primary/replica format.

Relational

is a type of database that connects tables of records together with complex relationships.

Big Data

is a very large data set (structured or unstructured) that can be mined or analyzed to find new trends or relationships for business intelligence.

Data mining

is an analytic process in which large amounts of data are searched and analyzed in order to find trends or patterns.

Information Technology Management

is concerned with the management of resources that facilitate access to information. These resources include computers and the technical infrastructures such as software, hardware, networking, and data center technologies, and staff that support them, including the technicians, analysts, project managers, and others

A data quality audit

is conducted to ensure that the information stored in a database is efficient, consistent, and accurate. Missing data can be identified during data quality audits.

ENIAC

is considered the first electronic, digital computer and was called "Great Brain" by the press;

The data warehouse

is contains data from several databases, from both internal and external sources; data quality audits are necessary for the quality of the data in the warehouse.

Open-source software

is created and updated by multiple programmers and available at no cost.

Knowledge Discovery

is data mining or extracting useful information from data.

The data administration function

is in charge of developing and maintaining the policies and procedures to manage internal data resources.

Strategic information system

is one that is created to meet a specific business objective and to provide a competitive advantage.

CEO (Chief Executive Officer)

is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund.

Random access memory (RAM)

is temporary or short-term storage used by the processor

COBOL (COmmon Business-Oriented Language)

is the first computer language developed in the 1950s for business computing

conceptual data model

is the highest level model, containing the least amount of detail within the data. Conceptual data models map the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprise-wide database.

Data cleansing

is the process of correcting or removing duplicated, incomplete, improperly formatted, inaccurate, or duplicated data from a database.

Telecommunication

is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks. The telegraph was the most prevalent telecommunication network in the late nineteenth century.

Data normalization

is the process of making a table normal by reorganizing the table structure to reduce data duplication and enforce data integrity.

Offshoring

is the strategy of having tasks performed by companies in other countries using information technology advancements such as the Internet and cloud computing.

The public switch telephone network (PSTN)

is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell. The PSTN is a wired infrastructure, composed of wires, cables, switches, repeaters, and other telecommunication components.

Category 5 (Cat5)

is typically made of copper but is much smaller than copper building wire that is used to carry electricity.

Crow's Foot

is used to indicate one, one and only one, none, or many. For example, one and only one customer can buy none to many products. One sales rep can help none or many customers.

Quality of Service (QoS)

is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.

A sniffer or packet analyzer

is used to monitor or log traffic on a network for troubleshooting or analysis, but is not a network hardware device.

Core Router

is very powerful (and expensive), and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.

Data redundancy

is when the same piece of information is stored in more than one location. A DBMS can solve the problems of data redundancy.

physical data models

may exist within the logical data model, containing greater detail, such as database tables and key indexes.

Computer systems analyst

must combine business knowledge with technical expertise. The primary responsibility of a systems analyst is to analyze a user's needs and determine the most efficient and effective solution. The computer systems analyst makes hardware and software recommendations, performs cost analysis, and oversees the implementation and troubleshooting of new systems.

ISPs, or Internet Service Providers

offer services to the business to gain access to the Internet.

IT managers, project managers, and architects

organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization. These individuals often have many years of general (for IT managers and IT project managers) or specific (for IT architects) work experience or training in IT in one or more disciplines, such as software development, information security, networking, and database or systems administration.

Entity-relationship diagram

outlines the business processes and subsequent relationships and possible data requirements.

computer support specialist

provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues. Support specialists may provide generalized support, such as a help desk specialist (i.e., Tier 1), administer specific support (i.e., Tier 2), provide system or application specific support (i.e., Tier 3), or provide architectural support (i.e., Tier 4). Specialists at higher support levels are considered analysts (see below) and are required to have elevated levels of experience, education, and/or training in specific technologies, processes, and systems.

Data administration

recovering corrupted information, and managing users and group access to the data.

Data integrity

refers to the accuracy and consistency of the data stored in a DBMS. The referential integrity rules prevent the bank teller from deleting your mortgage loan record in the Loan table accidentally since you are still listed as a customer in the Customer table. Both the Loan and Customer tables are linked together via a foreign key.

In-memory computing

refers to the exclusive use of inexpensive and abundant memory by a processor without secondary storage to slow it down, allowing the computer system to process massive amounts of data very quickly.

Business intelligence

refers to the infrastructure, data set, and relevant software tools that managers used on their company's databases to help them make better and more informed decisions.

Chief Security Officer (CSO)

sometimes also called the chief information security officer (CISO), is the highest level executive concerned with the overall security functions and policies of a business. (Note that larger organizations may also have a CISO reporting to a CSO). The CSO identifies business protection goals, works with the other executives to identify and analyze risks, and prioritizes security needs.

A business benefit of enterprise resource planning systems is

standardized business procedures.

ATM

stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.

Synergies

strategic relationships between media and information companies

One of the trends that is influencing the globalization of business is the increased role played by ________.

technology

Data management

the creation, update, and deletion of the data within the database.

Motherboard

the device that contains the system bus and connects the various input and output devices that compose any given computer system.

Moore's Law

the observation that computing power roughly doubles every two years.

Data retrieval:

using queries, data is retrieved and combined.

What does offshore outsourcing mean?

using resources that reside outside the country in another geographical region

Three factors to consider when defining big data are:

volume variety velocity

UNIVAC

was the first general purpose computer for commercial use.

artificial neural networks

which are nonlinear algorithm models used in data mining. This can be described as machine learning or advanced algorithms.

Rule Induction

which is a technique based on statistical importance.

system bus

which is the medium through which communications between the input, processor, storage, and output occur.

Computer programmers

write code to instruct computers to perform certain tasks. Programmers must have an eye for detail, along with strong analytical and problem solving skills. Many computer programs are written in programming languages such as Java and C++.


Related study sets

Supply Chain Chapter 6 Strategic Sourcing

View Set

Comptia A+ Hard Drive Technologies

View Set

Real Estate Broker Pre-Assessment

View Set

Child Psych Exam 3 (Chapter 12 - The Family)

View Set

Chapter 41: Disorders of Endocrine Control of Growth and Metabolism

View Set

Math 3 Unit 1: Functions and Inverses

View Set