Mgmt 382 exam 1

Ace your homework & exams now with Quizwiz!

2nd primary planning activity

2. Set the project scope •Project scope: clearly defines the high-level system requirements •Scope creep: occurs when the scope of the project increases •Feature creep: occurs when developers add extra features that were not part of the initial requirements •Project scope document: a written definition of the project scope and is usually no longer than a paragraph

3rd primary planning activity

3. Develop the project plan including tasks, resources, and timeframes •Project plan: defines the what, when, and who questions of system development •Project manager: an individual who is an expert in project planning and management, defines and develops the project plan and tracks the plan to ensure all key project milestones are completed on time •Project milestones: represent key dates for which you need a certain group of activities performed

phase 6: implementation

distribute the system to all of the knowledge workers and they begin using the system to perform their everyday jobs

Social Impact of ABCs (-ves): social media

fake news, echo chambers

Social Impact of ABCs (-ves): teachers & students

The advent of tablets, apps and computer devices has seen schools using mobile devices and internet gateways for assignments and learning

positioning

The user's location can be obtained in one of two main ways: -GPS: involves the equal distribution of 24 NAVSTAR satellites in six circular orbital planes that are centered on the Earth and are inclined at approximately 55° relative to the equator. Land-based receivers use these satellites to determine their positions. A location-based service could require that each of its users have a mobile device that contains a GPS receiver. -E911: Federal Communications Commission requires wireless carriers to pinpoint a caller's telephone number to emergency dispatchers. E911 also ensures that carriers are to provide user call locations from their wireless phones.

Heterogeneous Access:

Thin or thick clients can be accessed through the Internet.

Phase 4: Development

take all of your detailed design documents from the design phase and transform them into an actual system

Social Impact of ABCs (-ves): co-workers

technology automates tasks and replace certain non-technological systems, personnel often do not have to interact with other workers as much as before, but often interact more with computer systems

Modern IS Architectures

-Enterprise system architecture -Component based architecture -Service based architecture -Analytics based architecture

Outsourcing Advantages

-Focus on unique core competencies -Exploit the intellect of another organization -Better predict future costs -Acquire leading-edge technology -Reduce costs -Improve performance accountability

GCP for analytics

-GCP offers services that are global, scalable, flexible, cost-effective, and secure -It allows users to consume IT resources that are elastic and utility-like services -GCP services for analytics include: Core Infrastructure: computing, storage, networking, security, Analytics Services: big data and machine learning, User Services: development, management, and user experience

Measured Service:

-Metering service optimize resources usage. -Predictable computing expenses.

Choose the right implementation method

-Parallel implementation: use both the old and new system simultaneously -Plunge implementation: discard the old system completely and use the new -Pilot implementation: start with small groups of people on the new system and gradually add more users -Phased implementation: implement the new system in phases

Outsourcing Disadvantages

-Reduces technical know-how for future innovation -Reduces degree of control -Increases vulnerability of your strategic information -Increases dependency on other organizations

Resource Pooling:

-Resources pooled for multi-tenant model. -Dynamic assignment of physical and virtual resources

system software: drivers & utilities

-Routine operations -Manage data -Manage peripheral devices -Mange Security

What is SQL?

-SQL stands for Structured Query Language -Lets you access and manipulate databases -Became a standard of the American National Standards Institute (ANSI) in 1986, and of the International Organization for Standardization (ISO) in 1987

the major types of software

-application -system -hardware

SQL can:

-execute queries -retrieve data from a database -insert records in a database -update records in a database -delete records from a database -create new databases -create new tables in a database -create views in a database

system software: language translators

-interpreters -compliers

computer network topology

-point to point -bus -ring -star -tree -mesh -hybrid

system software: operating systems

-schedules computer events -allocates computer resources -monitor events

Two primary maintenance activities:

1. Build a help desk to support the system users •Help desk: a group of people who responds to knowledge workers' questions 2. Provide an environment to support system changes

Two primary development activities

1. Build the technical architecture 2. Build the database and programs •Both of these activities are mostly performed by IT specialists

intro to cloud computing

1. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable and scalable computing resources (e.g., Compute, storage, networks, and security) 2. It provides high level abstraction of computation, storage, network, and security models as platforms. 3. Resources are rapidly provisioned with minimal management effort. 4. It has a growing list of essential characteristics, service models, and deployment models.

Starting an ERD

1. Define the Entities. 2. Define the Relationships. 3. Add attributes to the relationships. 4. Assign Primary and Foreign Keys 5. Add cardinality to the relationships.

1st primary planning activity

1. Define the system to be developed •You can't build every system, so you make choices based on your organization's priorities, which may be expressed as critical success factors •Critical success factor (CSF) - a factor simply critical to your organization's success

Two primary design activities:

1. Design the technical architecture •Technical architecture - defines the hardware, software, and telecommunications equipment required to run the system 2. Design system models •This includes GUI screens that users will interface with, database designs (see XLM/C), report formats, software steps, etc

Two primary analysis activities:

1. Gather the business requirements •Business requirements - the detailed set of knowledge worker requests that the system must meet in order to be successful •Business requirements address the "why" and "what" of your development activities •Joint application development (JAD) - knowledge workers and IT specialists meet, sometimes for several days, to define or review the business requirements for the system 2. Prioritize the requirements •Requirements definition document -prioritizes the business requirements and places them in a formal comprehensive document •Again, you probably can't do everything, so prioritizing is important •Users sign off on this document which clearly sets the scope for the project

There are 3 common relationships:

1. Unary (degree one) 2. binary (degree two) 3. Ternary (degree three)

Two primary implementation activities

1. Write detailed user documentation •User documentation - highlights how to use the system 2. Provide training for the system users •Online training: runs over the Internet or off a CD-ROM •Workshop training: is held in a classroom environment and lead by an instructor

Two primary testing activities:

1. Write the test conditions •Test conditions - the detailed steps the system must perform along with the expected results of each step 2. Perform the testing of the system •Unit testing: tests individual units of code •System testing: verifies that the units of code function correctly when integrated •Integration testing: verifies that separate systems work together •User acceptance testing (UAT): determines if the system satisfies the business requirements

SDLC as a Waterfall Methodology

1. planning 2. analysis 3. design 4. development 5. testing 6. implementation 7. maintenance

IT outsourcing for software development can take one of four forms:

1. purchasing existing software 2. purchasing existing software and pay publisher to make certain modifications 3. purchase software and pay publisher for the right to make changes yourself 4. outsource the development of an entirely new and unique system for which no software exists

first generation computers

1940-1956 •The first computers used vacuum tubes for circuitry and magnetic drums for memory. •They were often enormous and taking up entire room. •First generation computers relied on machine language. •They were very expensive to operate and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions. •The UNIVAC and ENIAC computers are examples of first- generation computing device

2nd generation computers

1956-1963 •Transistors replaced vacuum tubes and ushered in the second generation of computers. •Second-generation computers moved from cryptic binary machine language to symbolic. • High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN. •These were also the first computers that stored their instructions in their memory.

3rd generation computers

1964-1973 •The development of the integrated circuit was the hallmark of the third generation of computers. •Transistors were miniaturized and placed on silicon chips, called semiconductors. •Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system. •Allowed the device to run many different applications at one time. •1960's saw the rise of Operating Systems

4th generation computers

1973-1985 •The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. •The Intel 4004 chip, developed in 1971, located all the components of the computer. •From the central processing unit and memory to input/output controls—on a single chip. •4th generation computers also saw the development of GUIs, the mouse and handheld devices.

5th generation

1985-beyond •High-end machines (e.g. servers) can have multiple CPU's •Fifth generation computing devices, based on artificial intelligence. •Are still in development, though there are some applications, such as voice recognition. •The use of parallel processing and superconductors is helping to make artificial intelligence a reality. •The goal of 5th generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.

process

A set of logically related tasks performed to achieve a defined outcome

Information System Components

A system is a set of elements or components that interact to accomplish goals. -Hardware: Computer Equipment -Software: Computer Programs -Databases: An organized collections of facts

artificial intelligence (AI)

AI and machine learning (ML) go hand in hand, feeding vast amounts of data into an AI engine, and then applying context (meaning) to the data in order to understand patterns of behavior that can then lead to both good and bad events

knowledge

An awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision

Attributes

Attribute is a property or characteristic of an entity that is of interest to the organization. •Each Entity has a set of Attributes •Ex: STUDENT: Student_ID, Student_Name, Phone_Number, Major

service based system architecture

Back-end: refers to a subordinate program, not directly accessed by the user, which performs a specialized function on behalf of a main software system. Web API: is an application programming interface for either a web server or a web browser. It is a web development concept, usually limited to a web application's client-side User Experience (UX): refers to a person's emotions and attitudes about using a particular product, system or service. It includes the practical, experiential, affective, meaningful and valuable aspects of human-computer interaction and product ownership.

big data

Big Data is about collecting, processing and analyzing large amounts of data from both traditional and digital sources in order to identify trends, patterns and emerging paradigms to help us make sound decisions.

phase 3: design

Design phase - build a technical blueprint of how the proposed system will work

telecommunications

Electronic transmission of signals for communication -Networks: Distant electronic communication -Internet: Interconnected Networks (WAN) -Intranet: Internal Corporate Network (LAN) -Extranet: Linked Intranets (MAN)

Business Intelligence Workflow

Ingest data •Download data Store data •Fill data lake in Cloud Data Storage Prepare •Create an enterprise data warehouse in BigQuery Analyze data •Interactive •Visualize in Data Studio

types of computer network

MAN: Metropolitan Area Network PAN: Personal Area Network LAN: Local Area Network WAN: Wide Area Network

Social Impact of ABCs (-ves): parents & children

Often, tablets raise children more than parents do, while a parent's inability to directly engage with their children often results in disconnected children who have not developed the correct social skills to engage with others in a healthy manner

data

Raw, unorganized facts

cloud computing

Software is now being offered as a service (i.e., cloud-based, where you are essentially leasing vs. purchasing it) for the past 10 year

Mapping

Statements to capture the entities, their attributes, relationships, and activities

Cost of Error by phases

Take time during analysis to get the business requirements correct. If you find errors, fix them immediately. The cost to fix an error in the early stages of the SDLC is relatively small. In later stages, the cost is huge. (planning phase cost is 0, maintenance stage cost is a lot)

On-Demand Self Service:

Unilateral provisioning of computing resources

The 5 Vs of Big Data

Volume: data at rest Variety: data in many forms Veracity: data in doubt Velocity: data in motion Value: data in money

Business intelligence (BI)

a collection information about customers, competitors, business partners, competitive environment, and your internal operations for making important, effective, and strategic business decisions •Hot topic in business today •Current market is $50 billion and double-digit annual growth

operating system

a collection of programs that manage peripheral devices and other resources allowed for time-sharing, where users share a computer by swapping jobs in and out as computers became affordable to small businesses, specialized programming languages were developed

Entity-Relationship Data Model (ERM)

a detailed, logical representation of the data for an organization or for a business area. Expressed in terms of: •Entities •Attributes •Relationships

Entity-Relationship Diagram (ERD)

a graphical representation of a Entity-Relationship Model •The purpose of an ERD is to capture the richest possible understanding of the meaning of data necessary for an information system or organization. •ERDs are made from Entities, Attributes, and Relations

DBMS engine

accepts logical requests from other DBMS subsystems, converts them into the physical equivalents, and access the database and data dictionary on a storage device

information technologies:

are systems of hardware and software that capture, process, exchange, store and/or present information using electrical, magnetic and/or electromagnetic energy

Extreme programming (XP)

breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is complete

database

collection of information that you organize and access according to the logical structure of the information

Data dictionary

contains the logical structure for the information in a database (Before you can enter information into a database, you must define the data dictionary for all the tables and their fields)

Social Impact of ABCs (-ves): couples

couples spend less and less time actually talking with each other, and more time glued to their mobile devices or TV sets.

Planning Phase of SDLC

create a solid plan for developing your information system

Component-based development (CBD)

focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications CBD focuses on: •Using already-developed components to build systems quickly •Building new components as needed that can be used in all future systems CBD Methodologies: •Rapid application development (RAD) •Extreme programming (XP)

Physical view

how information is physically arranged, stored, and accessed on a storage device

Logical view

how you need to arrange and access information to meet your needs

phase 2: analysis

involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system

Phase 7: Maintenance

monitor and support the new system to ensure it continues to meet the business goals

What is a service?

provides a discrete business function that operates on data. Its job is to ensure that the business functionality is applied consistently, returns predictable results, and operates within the quality of service required. •SOA services become the building blocks that form business flows •Services can be reused by other applications

phase 5: testing

verifies that the system works and meets all of the business requirements defined in the analysis phase

information systems

• a set of interrelated components that collect, manipulate, store data and distribute information to users and provide a feedback mechanism to monitor performance. •An organized combination of people, hardware, software, communications networks, and data resources that collects data, transforms it, and disseminates information.

information

•A collection of facts organized in such a way that they have additional value beyond the value of the facts themselves •Defining and organizing relationships among data creates information **The value of Information is directly linked to how it helps decision makers achieve their organizational goals

We Hold These Truths

•A database has a schema •We transform the data into that schema •Data conforms to the schema we define •The schema defines the business

Internet

•A network of networks, joining manygovernment, university and private computers together and providing an infrastructure for the use of E-mail, bulletin boards, file archives, hypertext documents, databases and other computational resources •The vast collection of computer networks which form and act as a single huge network for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world.

environment

•Business - other functional areas •Computer - hardware, software, other IT

Database Characteristics

•Collections of information •Created with logical structures •Include logical ties within the information •Include built-in integrity constraints

quantum computing

•Computation with coherent atomic-scale dynamics. •The behavior of a quantum computer is governed by the laws of quantum mechanics. •In quantum systems possibilities count, even if they never happen! •Each of exponentially many possibilities can be used to perform a part of a computation at the same time.

IS Development Methodologies

•Enterprise system development (e.g., MyPurdue) -Development methods (Insourcing, Outsourcing) •Component based systems (e.g., Microsoft Office) -Rapid application development methodology •Service based systems (e.g., Facebook, Google) -Agile methodology •Analytics system methodology -Kubeflow

BI Objectives

•Help people understand •Capabilities of the organization •State of the art trends and future directions of the market •Technological, demographic, economic, political, social, and regulatory environments in which the organization competes •Actions of competitors

OLAP

•Helps build business intelligence •Supported by data warehouses and data-mining tools

Agile methods focus on:

•Individuals and interactions: over processes and tools •Working software: over comprehensive documentation •Customer collaboration: over contract negotiation •Responding to change: over following a plan

Managing the sprint backlog

•Individuals sign up for work of their own choosing •Work is never assigned •Estimated work remaining is updated daily •Any team member can add, delete or change the sprint backlog •Work for the sprint emerges •If work is unclear, define a sprint backlog item with a larger amount of time and break it down later •Update work remaining as more becomes known

Location Management Function

•LBS applications employ an additional system to process positioning and GIS data, called a location management function. •The location management function acts as a gateway and a mediator between positioning equipment and LBS infrastructure.

outsourcing process

•Like insourcing, the outsourcing process looks similar to the traditional SDLC •Big exception here is that you "outsource" most of the work to another company •When outsourcing, you'll develop two vitally important documents - a request for proposal and a service level agreement

economic impact of ABC

•McKinsey estimates that AI may deliver an additional economic output of around US$13 trillion by 2030, increasing global GDP by about 1.2 % annually •McKinsey Global Institute estimates that Big Data could generate an additional $3 trillion in value every year in just seven industries. Of this, $1.3 trillion would benefit the United States.. •Cloud Computing •The cloud added approximately $214 billion in value-added to U.S. GDP in 2017. •The cloud added approximately 2.15 million jobs in 2017. •In approximately 15 years since 2002, the cloud economy has nearly tripled in size. •In 2017, wider adoption of cloud services estimated to add cumulative total revenue of EUR 449 billion to the EU28 GDP with significant impact on employment and business creation.

Agile Methods

•Rapid Application Development •Extreme Programming •SCRUM

sprints

•Scrum projects make progress in a series of "sprints" •Analogous to Extreme Programming iterations •Typical duration is 2-4 weeks or a calendar month at most •A constant duration leads to a better rhythm •Product is designed, coded, and tested during the sprint ** no changes during a sprint

SCRUM Characteristics

•Self-organizing teams •Product progresses in a series of two- to four-week "sprints" •Requirements are captured as items in a list of "product backlog" •No specific engineering practices prescribed •Uses generative rules to create an agile environment for delivering products •One of the "agile processes"

Outsourcing - SLA

•Service level agreement (SLA) - formal contractually obligated agreement between two parties •In outsourcing, it is the legal agreement between you and the vendor and specifically identifies what the vendor is going to do (and by when) and how much you're going to pay •Supporting SLA documents - service level specifications and service level objectives - contain very detailed numbers and metrics

OLTP

•Supports operational processing •Sales orders, accounts receivable, etc •Supported by operational databases & DBMSs

Geographic Information Systems (GIS)

•System for capturing, storing and analyzing location data and associated attributes which are spatially referenced to the earth. •Tools to provide and administer base-map data (man-made structures and natural terrain). •Point-of-interest data such as the location of restaurants or cinemas. •Information about the radio frequency characteristics of the mobile network, which allows determination of the user cell site.

insourcing

•Systems development life cycle (SDLC) - a structured step-by-step approach for developing information systems •7 distinct phases, each with well-defined activities •Also called a waterfall methodology, an approach in which each phase of the SDLC is followed by another, from planning through implementation

social impact of ABCs (+ves)

•Technology has helped to bridge a global gap in access to resources and opportunities •Unending source of resources -- educational materials, research publications, patents, and learning systems for people to access from their own homes •Social interactions: people often meet friends or dates using apps, from the convenience and comfort of their own home •Communication, transportation, and interactions with others •Social Media - access to news, information, etc

Cloud Platform as a Service (PaaS)

•The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applicationscreated using programming languages and tools supported by the provider. •The consumer does not manage or control the underlying cloud infrastructure. •Consumer has control over the deployed applications and possibly application hosting environment configurations

Cloud Infrastructure-as-a-Service (IaaS):

•The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources. •The consumer is able to deploy and run arbitrary software, which can include operating systems and applications. •The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).

Cloud Software as a Service (SaaS)

•The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. •The applications are accessible from various client devices such as a web browser (e.g., web-based email). •The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage.

What is an Information System (IS)?

•What: Information systems are core and/or support structures for meeting the company's strategic and operational goals •How: New systems are built because employees and customers request them or there are business opportunities to take advantage of. •Why: New systems are created to obtain a competitive advantage, operational efficiencies, and intra-, inter-organizational process coordination

computer network

•a set of computers connected to share resources •In a network computing devices exchange the data with each other by using the connections between nodes. The data links are established over cable media such as wires or optic cables or wireless media such as Wi-Fi.

Relationships

•are associations between one or more entity types. •Are the "glue" that holds together components of an E-R model. The degree of a relationship = is the number of entity types that participate in a relationship.

Rapid application development (RAD) (also called rapid prototyping)

•emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process •Prototypes are models of the software components •The development team continually designs, develops, and tests the component prototypes until they are finished

Outsourcing - RFP

•formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (vendors) to submit bids for its development •In outsourcing, you must tell another organization what you want developed; you do that with an RFP •Therefore, the RFP must be very detailed and complete •Some RFPs can take months or even years to develop

Data manipulation subsystem

•helps you add, change, and delete information in a database and query it to find valuable information •Most often your primary interface •Includes views, report generators, query-by-example tools, and structured query language

Data definition subsystem

•helps you create and maintain the data dictionary and structure of the files in a database •The data dictionary helps you define... -Field names -Data types (numeric, etc) -Form (do you need an area code) -Default value -Is an entry required,etc

Entity

•is a real-world object distinguishable or unique from other objects. •can be a concrete or physical object like employee, student, faculty, customer etc. Or it could also be conceptual or abstract like transaction, order, course, subjects etc. •It can be thought of as a noun like student, employee etc. **It is normally represented by a rectangle shape.

Relationship

•is a way of relating one entity to another. Entities can therefore participate in a relationship. •it is commonly thought as a verb connecting the entities or nouns. **It is normally represented by a diamond shape

Integrity constraints

•rules that help ensure the quality of information ex) •Data dictionary defines type of information - numeric, date, and so on •Foreign keys - must be found as primary keys in another file

relational database

•series of logically related two-dimensional tables or files for storing information -Relation = table = file -Most popular database model

Structured Query Language

•standardized fourth-generation query language found in most DBMSs •SQL along with Python and R language for business intelligence

Outsourcing

•the delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service •The main reasons behind the rapid growth of the outsourcing industry include the following: -The Internet -Globalization -Global talent pool -Technology -Deregulation

DNA computing

•utilizing the property of DNA for massively parallel computation. •With an appropriate setup and enough DNA, one can potentially solve huge problems by parallel search. •Utilizing DNA for this type of computation can be much faster than utilizing a conventional computer •Leonard Adleman proposed that the makeup of DNA and its multitude of possible combining nucleotides could have application in computational research techniques.


Related study sets

Chapter 22. Adulthood: Psychosocial Development

View Set

ECON 102: Ch. 1 - Ten Principles of Economics

View Set

Test 2 M&B - GI, fetal assessment, musculoskeletal, normal newborn assessment, neuro

View Set