HM 271 Exam 1 (Ch. 1, 2, 4, 5) – Flashcards
Flashcard maker : Sean Mitchell
General Manager
-operational systems
-technology to track and communicate with people
-big picture technology knowledge
-microsoft office
-technology to track and communicate with people
-big picture technology knowledge
-microsoft office
Controller
-spreadsheets
-data analytics
-time and attendance
-payroll
-microsoft office
-data analytics
-time and attendance
-payroll
-microsoft office
Director of Rooms Operations
-PMS
-reservation system
-revenue management system
-guest response system
-concierge system
-in-room amenities (mini bars, movies, safes)
-microsoft office
-reservation system
-revenue management system
-guest response system
-concierge system
-in-room amenities (mini bars, movies, safes)
-microsoft office
Revenue Manager
-revenue management system
-reservation system
-PMS
-sales and catering system
-microsoft office
-reservation system
-PMS
-sales and catering system
-microsoft office
Director of Sales and Marketing
-sales and catering system
-sales force automation
-website and E-commerce
-social media
-revenue management system
-meeting room layout
-microsoft office
-sales force automation
-website and E-commerce
-social media
-revenue management system
-meeting room layout
-microsoft office
Food and Beverage
-point-of-sale technology
-inventory management
-recipe management
-table management
-reservations
-labor forecasting and scheduling
-microsoft office
-inventory management
-recipe management
-table management
-reservations
-labor forecasting and scheduling
-microsoft office
Director of HR
-HR and information system
-payroll
-benefits
-online training
-time and attendance
-internet
-microsoft office
-payroll
-benefits
-online training
-time and attendance
-internet
-microsoft office
Director of Security
-access control systems
-surveillance
-fire alarm
-microsoft office
-surveillance
-fire alarm
-microsoft office
Director of Engineering
-heating
-ventilation
-AC (HVAC)
-energy management system
-preventative maintenance system
-microsoft office
-ventilation
-AC (HVAC)
-energy management system
-preventative maintenance system
-microsoft office
Director of Housekeeping
-PMS
-labor forecasting and scheduling
-microsoft office
-labor forecasting and scheduling
-microsoft office
IT Manager
-operating systems
-hardware platforms
-programming languages
-network and communications -architecture
-email server
-antivirus technology
-microsoft office
-hardware platforms
-programming languages
-network and communications -architecture
-email server
-antivirus technology
-microsoft office
Pace of change
IT Wave Trend
expected number of technology advances continue to grow at alarming rates
expected number of technology advances continue to grow at alarming rates
Technology demands of customers continue to rise
IT Wave Trend
Competitive environment
IT Wave Trend
increased emphasis on IT and investment
increased emphasis on IT and investment
Labor issues
IT Wave Trend
cost of labor and scarcity of people will require greater focus on technology
cost of labor and scarcity of people will require greater focus on technology
Advantages of IT
-differentiation
-efficiency
-resource capabilities
-cost reduction
-information asymmetry
-efficiency
-resource capabilities
-cost reduction
-information asymmetry
Value Chain
all the primary and support activities of the firm required to produce products and services that generate revenues and drive profits
Boundary Spanners
people who can cross multiple areas of knowledge
SWOT analysis
Strengths
Weaknesses
Opportunities
Threats
taking inventory of your skills and core competencies
Weaknesses
Opportunities
Threats
taking inventory of your skills and core competencies
IT Managerial (CIO)
Chief Informational Officer
represents the ultimate business-IT liaison and should report to CEO
represents the ultimate business-IT liaison and should report to CEO
IT Technical (CTO)
Chief Technology Officer
reports to the CIO and is responsible for the firm’s technology infrastructure, network, architecture, computers, etc.
reports to the CIO and is responsible for the firm’s technology infrastructure, network, architecture, computers, etc.
Non-IT Managerial (CEO)
still must be knowledgeable of IT
Competitive Method
using technology as a tool to gain competitive advantage
Digital Convergence
coming together of numerous technologies to make great things happen
-telecommunication
-information technology
-interactive multimedia content
-broadcast media
-telecommunication
-information technology
-interactive multimedia content
-broadcast media
Preemptive
strategic vision
Asset Optimization
getting the most value from firm resources or assets as measured by ROA
Co-alignment Principle
theoretical underpinning of strategy and the concept of competitive advantage
Path to Firm Profitability
-environmental events
-strategic choices and competitive methods
-resource allocation decisions
-firm performance and competitive advantage
-strategic choices and competitive methods
-resource allocation decisions
-firm performance and competitive advantage
KEY objective of strategy and planning is…
to focus on investments on areas that will have the greatest impact on growth and profitability on business
Cash flow per share
-a measure of a firm’s profitability
-reflects cash flows from investments
-illustrates management’s effectiveness with environmental scanning
-demonstrates how a business utilizes assets
-reflects cash flows from investments
-illustrates management’s effectiveness with environmental scanning
-demonstrates how a business utilizes assets
5 Forces Model
-addresses barriers to enter market
-intra-industry rivalries
-buyer power
-supplier power
-substitute products
-intra-industry rivalries
-buyer power
-supplier power
-substitute products
Generic strategies
-low-cost producer
-product differentiation
-market niche focus
-product differentiation
-market niche focus
Switching costs
things that lock in a customer to a product or company
Outcome approach
resource-based view (RBV)
-places great emphasis on competitive efficiency, business value, and management productivity
-uses such measures as revenue growth rate, ROI, ROA, profits, and net worth (macro-level)
-places great emphasis on competitive efficiency, business value, and management productivity
-uses such measures as revenue growth rate, ROI, ROA, profits, and net worth (macro-level)
Trait approach
RBV
identifies specific attributes of an IT application that are known to contribute to competitive advantage (micro-level)
identifies specific attributes of an IT application that are known to contribute to competitive advantage (micro-level)
Efficiency
CAPITA (5 dimensions)
extent to which an IT application allows a firm to produce products and services at prices lower than its competitors
extent to which an IT application allows a firm to produce products and services at prices lower than its competitors
Functionality
CAPITA
extent to which an IT application provides the functions and capabilities required by users
extent to which an IT application provides the functions and capabilities required by users
Threat
CAPITA
impact of an IT application on the balance of power between suppliers and buyers
impact of an IT application on the balance of power between suppliers and buyers
Preemptiveness
CAPITA
early adoption of an IT application
early adoption of an IT application
Synergy
CAPITA
degree of integration between an IT application and the firm’s goals, strategys, and environment
degree of integration between an IT application and the firm’s goals, strategys, and environment
Tacit
hidden competitive edge
KEY technology innovations will…
enable the best business practices
the USE of technology is important
the USE of technology is important
Needs of IT
-functionality
-flexibility
-usability
-scalability
-portability
-maintainability
-interoperability
-flexibility
-usability
-scalability
-portability
-maintainability
-interoperability
Hidden costs of IT
-training
-integration and testing
-customization
-data conversion
-project delays and overruns
-integration and testing
-customization
-data conversion
-project delays and overruns
Technology creates…
competitive advantage
ROI
the foundation upon which businesses are built
What are currencies of the future?
time and knowledge
-focus on business agility
-constantly collect good data to quickly convert into knowledge that can be shared throughout
-focus on business agility
-constantly collect good data to quickly convert into knowledge that can be shared throughout
Knowledge is…
perishable
-create a culture that supports and promotes learning and innovation
-use IT tool to better manage
-create a culture that supports and promotes learning and innovation
-use IT tool to better manage
Irrelevancy is ____ risk than inefficiency
greater
you can’t run tomorrow’s organization with yesterday’s skills or tools
you can’t run tomorrow’s organization with yesterday’s skills or tools
Company’s success
-business initiatives
-structure
-motivation
-leadership
-structure
-motivation
-leadership
People ready strategies
-develop customer relationships
-drive innovation
-improve operations
-build partner connections
-drive innovation
-improve operations
-build partner connections
Network
a transmission system that connects two or more applications running different computers
3 Parts to Networking
-security
-safety
-reliability
-safety
-reliability
Small nertworks
-anytime a computer communicates with another computer in a small setting (ex: computer to printer in an office)
-local businesses
-allow resources to be shared
-local businesses
-allow resources to be shared
Network Interface Cards (NIC)
-nodes: all stations on a network which are ease-of-use touch screens
-nodes need NIC to join a network
-nodes need NIC to join a network
2 Components of LAN software
-switches: where data travels through
-routers: networks communicating between networks
-routers: networks communicating between networks
Network Operating System (NOS)
-routes communication on the network and manages network resource
-resides on server
-boss of LAN
-resides on server
-boss of LAN
Medium
when the fast bits travel from one computer to the next
4 Mediums
-twisted copper wires (phone line)
-coaxial cable: cable TV
-fiber optics (local)
-wireless
-coaxial cable: cable TV
-fiber optics (local)
-wireless
Attenuation
weakening of signal
Bottleneck
significantly degrades network performance
Internet
-most well known network
-founded by US military
-founded by US military
Network Protocols (4 main objectives)
-type of error checking to be used
-data compression method
-how the sending device will indicate that it’s finished sending the message
-how the receiving device will indicate it’s received the message
-data compression method
-how the sending device will indicate that it’s finished sending the message
-how the receiving device will indicate it’s received the message
TCP/IP Protocol (transmission/internet)
-est. by Department of Defense 1970s
-layers that govern data flow through the software/hardware of sending/receiving computing devices
-layers that govern data flow through the software/hardware of sending/receiving computing devices
ISP (internet service provider)
IP addresses provide location of a node (numbers)
DNS (domain name server)
provides letters instead of numbers
Forms of internet communication
-email
-IM
-file transfer protocol (data transmission)
-IM
-file transfer protocol (data transmission)
World Wide Web
-most recognizeable
-NOT INTERCHANGEABLE WITH INTERNET
-part of the internet
-uses TCP/IP protocol
-URL uses DNS server to point to Web resources and addresses
-NOT INTERCHANGEABLE WITH INTERNET
-part of the internet
-uses TCP/IP protocol
-URL uses DNS server to point to Web resources and addresses
Large Wireless Networks
-cellular: geographic areas divided into cells (towers)
-long term evolution (LTE): 4th generation technology with WiMax as a separate offering
-long term evolution (LTE): 4th generation technology with WiMax as a separate offering
Voice Over Internet Protocol (VOIP)
IP TV and internet phone service
Cloud Computing
processing power, storage, and applications on service that can be accessed via internet
Application Service Provider (ASP)
generic software was made available over the internet
Software as a Service Provider (SaaP)
customized application tailored to a specific company’s needs and stored on their servers via internet
Unified Communication
various forms of communication can be managed in 1 mailbox which facilitates communication
Virtual Private Networks (VPN)
provides secure connection to different sites of an enterprise over the internet
Firewalls
prohibit users from accessing internet resources through user verification and passwords
Botnet
-popular form of attack is denial of service attack where routers and other devices on the internet are co-opted and forms
-can spread viruses (worms, Trojan horses, spyware)
-can spread viruses (worms, Trojan horses, spyware)
Encryption
scrambling of messages
Social Engineering
-methods used to get in the door of a network and wreak havoc on websites or illegally download data
-one party calling another party and tricking that party into giving access info
-one party calling another party and tricking that party into giving access info
Phishing
fake emails that trick user into providing info such as social security or bank account numbers
Network Behavior Analysis (NBA)
software which analyzes network for irregularities
E-commerce
transactions are merely adopting the latest communication tool – the internet
Business Models (3)
B2B, B2C, C2C
B2B
-buying bulk from another company
-e-procurement
-seeing increased growth
-e-procurement
-seeing increased growth
B2C
company sells something to consumer
C2C
2 individuals doing business with each other
Advertising
pop-ups
Auctioning
Ebay, Expedia
Subscription
-blogs
-people no longer do this because they can find it free somewhere else
-people no longer do this because they can find it free somewhere else
Mobil Commerce
-making purchase via mobile
-GPS tracks where purchasers are and can show them where they can buy things nearby
-GPS tracks where purchasers are and can show them where they can buy things nearby
Web Servers
-store web pages
-track “hits” to see what consumer is interested in
-E-commerce server: links payment systems like availability, price, shipping
-track “hits” to see what consumer is interested in
-E-commerce server: links payment systems like availability, price, shipping
Content Management
gives companies tools to manage and update web material
Performance Monitoring
quick web downloaded and makes sure all links to other web sites are active
Collaborative Management
customer purchases and behaviors are compared to other customers to predict future purchases
Click-stream tracking
-records exactly when and which website customer is
-helps understand customer habits
-helps understand customer habits
Cookies
-small bits of text that are written into hard drive by someone else during a website visit
-how websites welcome you back
-how websites welcome you back
Widgets
changing zip code on accuweather to see local weather
Mashups
meshing 2 apps together like weather app on calendar of each day
Real Simple Syndication (RSS)
computer device being set to constant updates or live feeds
Podcasting
syndication where many people can see the original work online
Search Engines
-agents used to find info
-GOOGLE
-crawlers, paid listings, meta-tag, SEO
-crawlers, paid listings, meta-tag, SEO
Crawlers
-search sites that add new sites as to relevance searched
Paid Listings
-charge businesses to get websites higher up on search engines
Meta-tag
-searches relevance of topic
-what you type on google tajes you to website with that meta
-what you type on google tajes you to website with that meta
Search Engine Optimization (SEO)
increase rankings on search engine
Spoofing
-creation of illegitimate sites that appear to be published by the org
-set up professional looking storefronts to try to take credit card info
-set up professional looking storefronts to try to take credit card info
Unauthorized Action
competitor or angry customer can alter your website so that it refuses service to potential clients
Unauthorized Disclosure
when hackers intercept transmissions to obtain your customer’s sensitive info
Data Alteration
content of a transaction can be intercepted and altered a different route (user names, credit cars, $)
Server ID
-securing your website
-low cost
-digital certificate (electronic equivalent to business license)
-low cost
-digital certificate (electronic equivalent to business license)
Certification Authority (CA)
-securing your website
-issue server IDs
-vouch for your right to use your company name and address
-issue server IDs
-vouch for your right to use your company name and address
Secure Sockets Layer (SSL)
-industry standard protocol for secure web-based communications
-provide authentication, message privacy, message integrity
-provide authentication, message privacy, message integrity
Authentication
your customers can verify web site belongs to you and not an imposter
Message Privacy
encrypts all info exchanged between web server and customers
Message Integrity
-when message is sent, sending and receiving computers each generate a code based on message content
-if anything is altered, the receiving computer will alert the recipient that the message isn’t legit
-if anything is altered, the receiving computer will alert the recipient that the message isn’t legit
Servers
more expensive computer with lots of memory, space, and fast CPU
-primary role: provide resources to client files, print, web, and database
-client, peer-to-peer, cloud
-interview: voice EDI
-primary role: provide resources to client files, print, web, and database
-client, peer-to-peer, cloud
-interview: voice EDI
Client Server
client requests resources from the server such as files, records, or service
Peer to peer
possess the same potential communications, capabilities, initiatives
Cloud
storage over internet
Private Branch Exchange (PBX)
-one common piece networking equipment
-hotels
-makes leasing phone lines less costly
-hotels
-makes leasing phone lines less costly
Telecommunications
-long distance communications
-telephone system
-ATT=1st nationwide network
-telephone system
-ATT=1st nationwide network
Convergence
-combining of voice, video, and data into one experience
-media streams
-Verizon Fios, cable, and internet in a package
-media streams
-Verizon Fios, cable, and internet in a package
Channel
-convergence
-instrument through which nodes communicate (medium)
-instrument through which nodes communicate (medium)
Modem
-convergence
-modulates digital signal converting it to analog
-aids in network transmissions
-modulates digital signal converting it to analog
-aids in network transmissions
Wide Area Network (WAN)
-1st type of larger networks
-network of larger geography than a LAN
-speed up data transmission over long distances
-transfer rate dependent on bandwidth
-network of larger geography than a LAN
-speed up data transmission over long distances
-transfer rate dependent on bandwidth
Bandwidth
-difference between highest and lowest point of signal
-channels and mediums can be improved by newer technologies
-channels and mediums can be improved by newer technologies
Digital Subscriber Lines (DSL)
-transmission technology
-operate over existing phone lines but require specific hardware to digitize signal
-can reach 9mbps or greater over short distances
-phone company’s 1st venture into the broadband or high speed market
-operate over existing phone lines but require specific hardware to digitize signal
-can reach 9mbps or greater over short distances
-phone company’s 1st venture into the broadband or high speed market
Cable Modems
-transmission technology
-use existing cable lines and can transmit up to 10mbps with increasing speeds
-use existing cable lines and can transmit up to 10mbps with increasing speeds
T1 Connection
-transmission technology
-dedicated phone connection with 24 of the RJ 11 phone lines
-trunk lines
-move data 1.54mbps
-dedicated phone connection with 24 of the RJ 11 phone lines
-trunk lines
-move data 1.54mbps
Utilities Fiber Network
-utility companies providing fiber networks
-link load balancer: can operate multiple mediums in a cost efficient manner
-link load balancer: can operate multiple mediums in a cost efficient manner