mis study guide

Ace your homework & exams now with Quizwiz!

Which of the following best describes enterprise applications?

Enterprise applications are systems that span functional areas, focus on executing business processes across the business firm, and include all levels of management

Operating System Software

Programs that make the computer work. PC operating systems- Windows, Mac- UNIX- Linux (open source)• Mobile operating systems- Chrome, Android, i O S

Business organization hierarchy

Senior management Middle-management Operational management

Trademark laws

These are legally protected names, symbols, or designs that identify a good or service of one seller and distinguishes them from their competitor

TPS (Transaction Processing System)

Transaction processing systems (TPS) are systems serving operational management, such as payroll or order processing, that track the flow of the daily routine transactions necessary to conduct business.

difference between internet and web

Web- how to display a website, without web cannot see the website Internet- service, without Internet service you can't see the website

offshore software outsourcing.

When firms outsource software work outside their national borders

business model

a plan that details how a company creates, delivers, and generates revenues

Business Process

a series of steps that are followed in order to carry out some task in a business How long does it take to get a starbucks coffee Get to starbucks, order, get receipt, wait for coffee Input —> process (order taking process)---> output It's important to know the business process to make your business better and create customer intimacy and have your customer keep returning because they're happy

Hotspot

a small geographical perimeter within which a wireless access point provides service to a number of users

data quality audit

a structured survey of the accuracy and level of completeness of the data in an information system

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model A majority of SaaS applications run directly through your web browser, which means they do not require any downloads or installations on the client side. EX: Google Workspace, Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting

A switch

has more intelligence than a hub and can filter and forward data to a specified destination on a network.

Output devices

include display monitors, printers, and audio output devices.

green computing

includes practices and technologies for producing, using, and disposing of information technology hardware to minimize negative impact on the environment.

Graphical User Interface (GUI)

is the part of the operating system users interact with that uses graphic icons and the computer mouse to issue commands and make selections.

Normalization

is the process of creating stable data structures from complex groups of data when designing a relational database.

Capacity Planning

is the process of predicting when a computer hardware system becomes saturated. It considers factors such as the maximum number of users that the system can accommodate at one time, the impact of existing and future software applications, and performance measures, such as the minimum response time for processing business transactions.

IT infrastructure

is the shared technology resources that provide the platform for the firm's specific information system applications.

senior management

makes long range, strategic decisions about products and services and ensures financial performance of the firm. Works with summary information to quickly and form of overall performance (ESS) Exclusive support system Lecture e.g. checking last year's sales vs. this year's Book e.g gross sales, revenues, sales by product group, and region, overall profitability

Downloading an e-book from Amazon, buying a computer online at Best Buy, and downloading a song from iTunes are examples of how

new information technology frequently changes the way a business works and supports entirely new business models.

Virtualization

organizes computing resources so that their use is not restricted by physical configuration or geographic location.

How search engines work

page repository, spiders, search engine results page, URL, web directory; an application for locating webpages or other content on a computer network using spiders (web bots, small computer programs designed to perform automated repetitive tasks over the internet)

Management Information Systems (MIS)

produce reports serving middle management by condensing information from transaction processing systems, and these are not highly analytical.

Spam

refers to junk emails sent by an organization to a mass audience of Internet users.

Keylogger

refers to spyware that records every keystroke made on a computer to steal personal information or passwords or to launch Internet attacks.

Competitive Forces

the actions of competitors, who are in the process of implementing their own marketing plans

Business Process Reengineering

the activity of altering existing and designing new business processes to take advantage of new information systems

Total Cost of Ownership (TCO)

the cost of owning and operating a system, including the total cost of acquisition, as well as all costs associated with its ongoing use and maintenance.

Magnetic disks

the most widely used secondary storage medium today, store data by means of magnetized spots on a hard or floppy disk.

data mining

the process of analyzing data to extract information not offered by the raw data alone

Modulation

the process of turning a digital signal (sent from the sending computer) into an analog signal (so that it can be transmitted as electrical pulses).

Value Chain

the series of internal departments that carry out value-creating activities to design, produce, market, deliver, and support a firm's products A value chain analysis gives businesses a visual model of these activities, allowing them to determine where they can reduce costs.

In-memory computing

the technology for the very rapid analysis and processing of large quantities of data by storing the data in the computer's main memory rather than in secondary storage.

Some of the roles of an information policy are __________.

to identify which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information.

When dealing with platform and infrastructure change, scalability refers

to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. As firms grow older, they can outgrow their infrastructure. As firms shrink, they can get stuck with excessive infrastructure purchased in better times. Considering a firm's scalability can help a firm remain flexible.

Systems analysts

constitute the principal liaisons between the information systems groups and the rest of the organization. Job to translate business problems and requirements into information requirements and systems.

difference between data and information

data- raw facts and figures that may or may not be relevant to a business decision information- knowledge gained from processing date

Data governance

deals with the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise.

Text mining

is the discovery of patterns and relationships from large sets of unstructured data.

survival

Businesses may need to invest in information systems out of necessity; it is simply the cost of doing business. Keeping up with competitors Citibank's introduction of A T M s

Components of IT Infrastructure

1. Computer hardware platforms 2. Operating system platforms 3. Enterprise software applications 4. Data management and storage 5. Networking/telecommunications platforms 6. Internet platforms 7. Consulting system integration services

Online analytical processing (OLAP)

best defined as the capability for manipulating and analyzing large volumes of data from multiple perspectives.

patent

(n.) exclusive rights over an invention; copyright; (v.) to arrange or obtain such rights; (adj.) plain, open to view; copyrighted

Customer and supplier intimacy

-Customers who are served well become repeat customers who purchase more -Close relationships with suppliers result in lower costs -Mandarin Oriental Hotel Uses I T to foster an intimate relationship with its customers, keeping track of preferences, and so on

difference between 3g and 4g

3G networks offer fair transmission speeds for browsing the web and online shopping, but are too slow for videos. 4G networks, on the other hand, provide enough capacity to watch high definition videos on smartphones.

Entity Relationship Diagram (ERD)

A diagram that depicts an entity relationship model's entities, attributes, and relations.

Primary Key

A field (or group of fields) that uniquely identifies a given entity in a table A primary key generally focuses on the uniqueness of the table. It assures the value in the specific column is unique.

Data that are inaccurate, incomplete, or inconsistent create serious operational and financial problems for businesses because they create inaccuracies in product pricing, customer accounts, and inventory data, and lead to inaccurate decisions about the actions that should be taken by the firm. Which of the following is NOT a step a firm might take to make sure they have a high level of data quality?

A firm would not use in-memory computing to make sure they have a high level of data quality. In-memory computing is technology for the very rapid analysis and processing of large quantities of data by storing the data in the computer's main memory rather than in secondary storage. A firm should use enterprise-wide data standards to make sure they have a high level of data quality.

Foreign Key

A foreign key is generally used to build a relationship between the two tables. Table allows only one primary key.

client/server computing.

A model for a computer that splits the processing between clients and servers on a network, assigning functions to the machine most able to perform the function

Client/Server

A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information. A client usually does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client-server model are email, network printing, and the World Wide Web.

protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.

Circuit Switching

A switching technique in which one endpoint creates a single path connection to another, depending on the requirement.

Cloud Computing

A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually Well, there are 3 types of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). With IaaS, companies control their own computing, networking, and storing components without having to manage them on-premises physically.

Disruptive Technology

A technology that displaces an established technology and shakes up the industry, or a ground-breaking product that creates a completely new industry. Email- nobody in offices writes letters anymore

privacy/privacy laws

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself Fair information practices- Set of principles governing the collection and use of information Basis of most U.S. and European privacy laws

Which of the following is NOT a challenge of managing IT infrastructure?

Consulting with shareholders on best practices is not a particular challenge of managing IT infrastructure. Managing capacity planning and scalability so that the firm has enough computing power for its current and future needs is a challenge of managing IT infrastructure. Balancing the costs and benefits of building and maintaining the firm's own hardware and software versus outsourcing or using an on-demand computing model is a challenge of managing IT infrastructure. For companies with global operations, managing software localization is a challenge of managing IT infrastructure.

Customer relationship management (CRM) systems

Customer relationship management (CRM) systems track all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customer satisfaction, and customer retention.

data mining

Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis. Data mining techniques and tools enable enterprises to predict future trends and make more-informed business decisions.

data warehouse

David creates a central database by extracting, transforming, and loading metadata from various internal and external sources of information. He plans to use this database for executing various functions such as intelligence gathering, strategic planning, and analysis. This central repository of information is referred to as a

collaboration platforms

Google Sites/ Google Apps, Microsoft Sharepoint, and IBM notes

Improved decision making

If managers rely on forecasts, best guesses, and luck, they will misallocate employees, services, and inventory. Real-time data improves ability of managers to make decisions. Verizon: web-based digital dashboard to update managers with real-time data on customer complaints, network performance, and line outages

operational excellence

Improved efficiency results in higher profits. Information systems and technologies help improve efficiency and productivity. Example: Walmart Power of combining information systems and best business practices to achieve operational efficiency—and over $514 billion in sales in 2019 Most efficient retail store in world as result of digital links between suppliers and stores

record

In a database, each row represents a -

key field

In a database, is used to uniquely identify each record for retrieval or manipulation. In a database, each column represents an attribute or a field. In a database, each row represents a record. An entity is another name for a table in a relational database

Which of the following statements about the power of a relational DBMS is FALSE?

It's false that The relational database is well suited for analyzing big data, or data that does not easily fit into columns. Programs like Hadoop are better suited for this type of data It's true that relational database tables can be combined easily to deliver data required by users, provided that any two tables share a common data element. It's true that each table in a relational database contains a key field to uniquely identify each record for retrieval or manipulation. It's true that relational database products are powerful partly because they are available as cloud computing services.

input devices

Keyboards, computer mice, touch screens, magnetic ink, and digital scanners

Network economics

Model of strategic systems at the industry level based on the concept of a network where adding another participant entails zero marginal costs but can create much larger marginal gains. An economic network is a combination of individuals, groups, or countries interacting to benefit the community as a whole. The primary goal of the group in an economic network is to strengthen its position in a market.

Difference between niche and product differentiation

Niche- Coffee shops specifically for people with diabetes, their coffees have less sugar Product differentiation- multiple products but mine is different, selling converse with my personal art drawn on them

Normalization is best defined by which of the following?

Normalization is the process of creating stable, yet flexible data structures from complex groups of data when designing a relational database.

Packet Switching

Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer

competitive advantage

Often results from achieving previous business objectives Advantages over competitors: Charging less for superior products, better performance, and better response to suppliers and customers Examples: Apple, Walmart, and U P S are industry leaders because they know how to use information systems for this purpose

Demodulation

On the flipside we have demodulation, which takes an analog signal and turns it back into a digital signal that can be read by the receiving computer.

Six Business Drivers

Operational excellence New products, services, and business models Customer and supplier intimacy Improved decision making Competitive advantage Survival

opt-in/opt-out

Permission-based electronic communication in which the consumer agrees to receive e-mail and related promotional materials (opt-in) typically by registering personal contact information on a website, or providing an instruction to terminate such an arrangement (opt-out).

Which of the following best describes social business?

Social business is the use of social networking platforms, including Facebook, Twitter, and internal corporate social tools, to engage employees, customers, and suppliers, and enhance collaborative work.

Decision Making Process

Step 1: Intelligence: discovering, identifying, and understanding the problems occurring in the organization (Why is the problem happening?). Step 2: Design: identifying and exploring various solutions to the problem Step 3: Choice: choosing among solution alternatives Step 4: Implementation: making the chosen alternative work and continuing to monitor how well the solution is working. If a solution does not work then go back to an earlier step and follow through down the line again.

Decision Suport System (DSS)

Systems that support management decisions that are unique and rapidly changing, using advanced analytical methods are called decision-support systems (DSS). Management information systems (MIS) produce reports serving middle management by condensing information from transaction processing systems, and these are not highly analytical. Transaction processing systems are systems serving operational management, such as payroll or order processing, that track the flow of the daily routine transactions necessary to conduct business. Executive support systems (ESS) are information systems at the organization's strategic level designed to address unstructured decision making through advanced graphics and communications.

Privacy

The claim of individuals to be left alone, free from surveillance. Claims to privacy are also involved at the workplace. Millions of employees are subject to electronic and other forms of high-tech surveillance.

information systems department

The department responsible for maintaining the hardware, software, data storage, and networks that comprise the firm's IT infrastructure is

difference between packet/circuit switching

The main advantage that packet switching has over circuit switching is its efficiency. Packets can find their own data paths to their destination address without the need for a dedicated channel. In contrast, in-circuit switching network devices can't use the channel until the voice communication has been terminated.

information policies

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information are specified by

Normalization

The process of applying rules to a database design to ensure that information is divided into the appropriate tables. Normalization is a database design technique that reduces data redundancy and eliminates undesirable characteristics like Insertion, Update and Deletion Anomalies. Normalization rules divides larger tables into smaller tables and links them using relationships

modem

The term modem is actually conceived from the two processes it performs: modulation and demodulation.

Radio Frequency Identification (RFID)

a wireless system comprised of two components: tags and readers. The reader is a device that has one or more antennas that emit radio waves and receive signals back from the RFID tag. systems provide a powerful technology for tracking the movement of goods throughout the supply chain. RFID systems use tiny tags with embedded microchips containing data about an item and its location to transmit radio signals over a short distance to RFID readers. The RFID readers then pass the data over a network to a computer for processing. Unlike bar codes, RFID tags do not need line-of-sight contact to be read. The RFID tag is electronically programmed with information that can uniquely identify an item plus other information about the item such as its location, where and when it was made, or its status during production.

Executive Support Systems (ESS)

address non-routine decisions requiring judgment, evaluation, and insight because there is no agreed-on procedure for arriving at a solution. are information systems at the organization's strategic level designed to address unstructured decision making through advanced graphics and communications.

Data Cleansing

also known as data scrubbing, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.

digital dashboard

an increasingly popular tool used to articulate key performance indicators to help with decision making within an organization. displays on a single screen graphs and charts of key performance indicators for managing a company.

Virtual Private Networks (VPN)

are a secure connection between two points across the Internet to transmit corporate data. VPN provides a low-cost alternative to a private network.

Enterprise Systems

are private corporate networks based on Internet technology that assemble information from disparate systems.

structured decisions

are repetitive and routine, and they involve a definite procedure for handling them so that they do not have to be treated each time as if they were new. Operational management (individual employees and teams): determine overtime eligibility, restock inventory, offer credit and special offers to customers,

Cookies

are small text files deposited on a computer hard drive when a user visits Web sites.

unstructured decisions

are those in which the decision maker must provide judgment, evaluation, and insight to solve the problem. (high management; not routine; not procedure) Senior management: approve budgets, decide long term goals, decide when to enter or exit a market

Web Beacons

are tiny software programs that keep a record of users' online clickstream. Marketers use web beacons as another tool to monitor online behavior.

Hubs

are very simple devices that connect network components, sending a packet of data to all other connected devices. Most networks contain a switch or a hub acting as a connection point between the computers.

Supply Chain Management Systems

automate the flow of information between a firm and its suppliers in order to optimize the planning, sourcing, manufacturing, and delivery of products and services.

Nanotechnology

builds structures and processes based on the manipulation of individual atoms and molecules.

barriers to entry

business practices or conditions that make it difficult for new firms to enter the market

Total Cost of Ownership (TCO) model

can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.

middle management

carries out the programs and plans of senior management. (DSS) Decision support system Lecture e.g. When deciding what kind of bike to get to ride in the mountains you would choose a mountain bike Book e.g. Sales contacts, production stats for specific factories or production lines, employment levels, and costs, sales rev for each month/day

Application Software

computer software created to allow the user to perform a specific job or task Programming languages for business

The hypertext transfer protocol (HTTP)

is the communication standard used to transfer pages on the Web. It defines how messages are formatted and transmitted.

Infrastructure as a Service (IaaS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model IaaS is fully self-service for accessing and monitoring computers, networking, storage, and other services. IaaS allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright. EX: DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco Metapod, Microsoft Azure, Google Compute Engine (GCE)

Software Outsourcing

enables a firm to contract custom software development or maintenance of existing legacy programs to outside firms, which often operate offshore in low-wage areas of the world.

Transmission Control Protocol (TCP)

establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent. It has been adopted as a universal communications standard for linking disparate networks and computers, including the Internet.

Cloud Computing

firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers.

The database administration

functions of an organization are responsible for defining and maintaining a database. These functions are performed by a database design and management group.

web mining

is the discovery and analysis of useful patterns and information from the World Wide Web.

New products, services, and business models

information systems and technology are major enabling tools for new products. services, and business models -example: apples iPad, googles android os, netflix

Electronically checking a client's credit and generating an invoice are examples of how

information systems automate many steps in business processes that were formerly performed manually.

Grid computing

involves connecting geographically remote computers into a single network to create a computational grid that combines the power of all the computers on the network.

data definition

is a DBMS capability that specifies the structure and content of the database.

data warehouse

is a central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning. The ability to draw high-quality information from an organization's databases to spot trends, identify patterns, generate reports for compliance purposes, do research, and plan strategy is critical to the stakeholders of any organization.

A router

is a communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address.

Web hosting service

is a company with large web server computers to maintain the web sites of fee-paying subscribers.

Server

is a computer specifically optimized to provide software and other resources to other computers over a network.

Hybrid Cloud

is a computing model where firms use both their own IT infrastructure and also public cloud computing services.

service level agreement (SLA)

is a formal contract between customers and their service providers that defines specific responsibilities of the service provider and the level of service expected by the customer.

Database Schema

is a graphic that documents the data model and shows the tables, attributes, keys, and logical relationships for a database.

A mainframe

is a large-capacity, high performance computer that can process large amounts of data very rapidly.

Database Management System (DBMS)

is a program used to create, process, and administer a database.

Copyright

is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death.

Non-relational database management systems

is a system for working with large quantities of structured and unstructured data that would be difficult to analyze with a relational model.

A data dictionary

is an automated or manual tool for storing and organizing information about the data maintained in a database.

Protection of personal privacy

is an ethical issue in information systems because of the rise of the Internet. The development of information technology will produce benefits for many and costs for others.

Hadoop

is an open-source software framework that enables distributed parallel processing of huge amounts of data across many inexpensive computers. It breaks a big data problem down into subproblems, distributes them among up to thousands of inexpensive computer processing nodes, and then combines the result into a smaller data set that is easier to analyze.

Linux

is an operating system created by the open source community.

Which of the following best describes a data manipulation language (DML)?

is associated with a database management system that end users and programmers use to manipulate data in the database.

data administration

is responsible for the specific policies and procedures through which data can be managed as an organizational resource

Service-oriented architecture (SOA)

is software architecture of a firm built on a collection of software programs that communicate with each other to perform assigned tasks to create a working software application.

An application server

is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.

Operational Management

responsible for monitoring daily activities of business. (TPS) Transaction processing system Lecture e.g. Mcdonalds receipts Book e.g. Number of parts in inventory each day or number of hours logged in -helps with decision making -with a structured hierarchy, and through business processes, organizations accomplish and coordinate work. Examples of business processes would be developing a new product, for filling in order, and hiring a new employee

system software

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management

Knowledge Management Systems

supports the capturing, organization, and dissemination of knowledge throughout an organization

Platform as a Service (PaaS)

supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain management of the applications. EX: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache Stratos, OpenShift

Kinds of software

system and application

enterprise social networking tools

tools that create business value by connecting the members of an org through profiles, updates, and notifications, similar to FB features, but tailored to internal corporate uses Salesforce Chatter, Microsoft's Yammer, Jive, and IBM Connections, which connect the members of an organization through profiles, updates, and notifications, are examples of

Enterprise social networking tools are best defined as

tools that create business value by connecting the members of an organization through profiles, updates, and notifications, similar to Facebook features, but tailored to internal corporate uses

Optical discs

use laser technology to store large quantities of data, including sound and images, in a highly compact form.

Semi-structured decision

when only part of the problem has a clear-cut answer provided by an accepted procedure. Middle management: design a marketing plan, develop departmental budget, design website

An information policy

would specify that only selected members of the payroll and human resources department would have the right to change sensitive employee data, such as an employee's salary and social security number, and that these departments are responsible for making sure that such employee data are accurate.


Related study sets

musculoskeletal anatomy exam 6 (spine and thorax)

View Set

Chapter 4: Health of the Individual, Family, and Community

View Set

Cell Biology-MCB 2210-May Session Final Exam Questions

View Set

Naive Bayes Tutorial - Project 0 (Intro to Machine Learning)

View Set

fin lit housing and insurance exam

View Set

Chapter 5 - Creating Effective Business Messages

View Set

Загальноприродничі та екологічні закони (питання №8)

View Set