ISYS 363 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following are examples of "Predictive Analysis"?
answer
target example of knowing when woman are pregnant and looking at baby items
question
Which of the following functions does DNS provide?
answer
Domain Name System allows us to type a name like Nike.com online, it will find the IP address that matches the name and brings us to the website
question
Why would a business use a VPN service?
answer
Visual Private Network ex: if you are working from a hotel you cannot print to your office printer, with VPN it allows you to remotely connect to things like you printers and work computers -could use the files from work/print remotely -get access to corporate network -secure internet traffic (shield your info from public wifi)
question
What is a BI software shown in class?
answer
Tablo Software (can visualize the data)
question
What are the steps involved in the SDLC?
answer
System Development Life Cycle (waterfall methodology, one step after the other) (1)planning: brainstorming issues and identifying opportunities for the organization, prioritize and choose projects for development, set the project scope, develop the project plan (2)analysis: gather the business requirement for the system, define any constraints associated with the system (3)design: design the technical architecture required to support the system, design the system models (4)development: build the technical architecture, build database, build the applications (5)testing: write the test conditions, perform system testing (6)implementation: write detailed user documentation, provide training for the system users (7)maintenance: build a help desk to support the system users, provide an environment to support system changes
question
What service would a business use to make sure its content can be loaded very fast from around the world?
answer
get content on a variety of machines around the world, (content delivery network) Akamai or cloudfare -they maintain a lot of servers along the globe and is you pay them they will load your content on their networks so it will load faster
question
What is an IP address? How does it look like? Why do you have one? What can it be used for?
answer
-Internet protocol -an address -a unique 32-bit number that identifies the location of a computer on a network. -4.294.967.296 -For a computer to communicate with other computers and web servers on the Internet, it must have a unique numeric -get address from your router/service provider -do not keep IP address for life (switch as soon as wifi changes)
question
SQL
answer
Structured Query Language -asks users to write lines of code to answer questions against a database. -MIS professionals have the skills requires to code SQL Tool for retrieving information from database management systems (DBMS)
question
Linux
answer
-is an operating system built by volunteers and distributed for free and has become one of the primary competitors to Microsoft -inside a boggling array of computers, machines, and devices. -robust enough to run the world's most powerful supercomputers, yet sleek and versatile enough to run inside consumer items like TiVo, cell phones, and handheld portable devices. -is the fastest-growing server operating system, with shipments expected to grow by 34 percent per year over the next four years. -With its innovative open source approach, strong security, reliability, and scalability, Linux can help companies achieve the agility they need to respond to changing consumer needs and stay ahead of the game
question
MySQL
answer
-an open-source relational database management system (RDBMS)
question
SaaS
answer
Software as a Service -delivers applications over the cloud using a pay-per-use revenue model -offers a number of advantages; the most obvious is tremendous cost savings. -com is one of the most popular SaaS providers. -Tapping the power of SaaS can provide access to a large-scale, secure infrastructure, along with any needed support, which is especially valuable for a start-up or small company with few financial resources
question
Open Source
answer
Refers to any software whose source code is made available free for any third party to review and modify.
question
ERP
answer
Enterprise Resource Planning -serve as the organization's backbone in providing fundamental decision-making support -systems provide a foundation for collaboration between departments, enabling people in different business areas to communicate. -widely adopted in large organizations to store critical knowledge used to make the decisions that drive performance -The heart of an ERP system is a central database that collects information from and feeds information into all the ERP system's individual application components (called modules) supporting diverse business functions such as accounting, manufacturing, marketing, and human resources.
question
(Systems) Integration
answer
-allows separate systems to communicate directly with each other. -not only enable the different departments to share information, but have also dramatically increased the quality of the information -Without integrations, an organization will (1) spend considerable time entering the same information in multiple systems and (2) suffer from the low quality and inconsistency typically embedded in redundant information -choose from two integration methods: The first is to create forward and backward integrations that link processes (and their underlying databases) in the value chain. A forward integration takes information entered into a given system and sends it automatically to all downstream systems and processes. A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes, would be sent upstream to the sales system and downstream to the order fulfillment and billing systems
question
Alpha and beta Testing
answer
Alpha Testing: Assess if the entire system meets the design requirements of the users, improve the quality of the product and ensure beta readiness. Beta Testing: after alpha test, Improve the quality of the product, integrate customer input on the complete product, and ensure release readiness,
question
Artificial Intelligence AI (ex: Neural Networks)
answer
-simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence (1) expert systems:are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems, ex:playing chess) (2) neural networks: also called an artificial neural network, is a category of AI that attempts to emulate the way the human brain works, Fuzzy logic is a mathematical method of handling imprecise or subjective information, ex:credit card companies checking for fraud (3) genetic algorithms:is ,an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem, Mutation is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome, ex: investment companies in trading decisions (4) intelligent agents:special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users, shopping bot is software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability, ex:environmental scanning and competitive intelligence (5) virtual reality:is a computer-simulated environment that can be a simulation of the real world or an imaginary world, ex: working virtual around the globe
question
Batch processing vs real-time (online transaction processing (OLTP))
answer
-Batch processing requires separate programs for input, process and output. An example is payroll and billing systems. -Real time data processing involves a continual input, process and output of data. Data must be processed in a small time period (or near real time). -Online transaction processing (OLTP) is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information
question
Best practices (in ERP software)
answer
indicate that corporations securely store all business records using the same guidelines set for public accountants, which state that organizations shall maintain all audit or review work-papers for a period of five years from the end of the fiscal period in which the audit or review was concluded (i think)
question
Bit(s)/Byte(s)
answer
-Word length—number of bits (0s and 1s) that can be processed by the CPU at any one time. -Computers work in terms of bits and bytes using electrical pulses that have two states: on and off.
question
Bug, patch, update, upgrade (software) - why is software not error free?
answer
Bug: are defects in the code of an information system Patch/update:occur when the software vendor releases updates to software to fix problems or enhance features Upgrade:occurs when the software vendor releases a new version of the software, making significant changes to the program
question
Business Intelligence (BI)
answer
-is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making -the best way to understand your customers' current and—more importantly—future needs
question
Business process re engineering vs. continuous improvement
answer
Business Process Reengineering (BPR):is the analysis and redesign of workflow within and between enterprises. BPR relies on a different school of thought than continuous process improvement Continuous Improvement: attempts to understand and measure the current process, and make performance improvements accordingly, Organizations begin by documenting what they do today, establish some way to measure the process based on what customers want, perform the process, measure the results, and then identify improvement opportunities based on the collected information
question
Business Strategy
answer
Porter has identified three generic business strategies for entering a new market: (1) broad cost leadership (2) broad differentiation (3) focused strategy. Ex: Broad market and low cost: Walmart competes by offering a broad range of products at low prices. Its business strategy is to be the low-cost provider of goods for the cost-conscious consumer. Broad market and high cost: Neiman Marcus competes by offering a broad range of differentiated products at high prices. Its business strategy offers a variety of specialty and upscale products to affluent consumers. Narrow market and low cost: Payless competes by offering a specific product, shoes, at low prices. Its business strategy is to be the low-cost provider of shoes. Payless competes with Walmart, which also sells low-cost shoes, by offering a far bigger selection of sizes and styles. Narrow market and high cost: Tiffany ; Co. competes by offering a differentiated product, jewelry, at high prices. Its business strategy allows it to be a high-cost provider of premier designer jewelry to affluent consumers.
question
Chief Information Officer (CIO)
answer
Responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives
question
Circuit Switched Network (vs packet switched)
answer
Circuit Switched Network:A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call Packet Switched:occurs when the sending computer divides a message into a number of efficiently sized units of data called packets, each of which contains the address of the destination computer
question
Client/Server Architecture
answer
is a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients
question
Cloud Computing, Software as a Service (SAAS), platform as a service
answer
offers new ways to store, access, process, and analyze information and connect people and resources from any location in the world where an Internet connection is available
question
Competitive Advantage (+ Porter's five forces model)
answer
Buyer Power:is the ability of buyers to affect the price they must pay for an item Supply Power:is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services) Threat of Substitute Products of Service:is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose Threat of New Entrants:is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market Rivalry Among Existing Competitors:is high when competition is fierce in a market and low when competitors are more complacent.
question
Computer Networks
answer
-Networks range from small two-computer networks to the biggest network of all, the Internet, A wide area network (WAN) spans a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks. The world's most popular WAN is the Internet -A local area network (LAN) is designed to connect a group of computers in proximity to each other such as in an office building, a school, or a home. -A metropolitan area network (MAN) is a large computer network usually spanning a city.
question
Computer security (anti-virus, backup, worm, trojan horse)
answer
Backdoor Program: open a way into the network for future attacks Denial of Service Attack (DoS):attacks from multiple computers that flood a website with so many requests for service that it slows down on crashes Trojan Horse: hides inside other software, usually as an attachment or a downloadable file Worm: spreads itself not only from file to file, but also from computer to computer
question
Cookie
answer
-is a small file deposited on a hard drive by a website containing information about customers and their browsing activities. -allow websites to record the comings and goings of customers, usually without their knowledge or consent
question
Critical Success Factors
answer
-Understand Reengineering -Build a Business Political Case -Adopt a Process management Approach -Measure and Track Performance Continuously -Practice change Management and Provide Central Support -Manage Reengineering Projects for Results
question
Customer Relationship Management (CRM)
answer
is a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability. CRM allows an organization to gain insights into customers' shopping and buying behaviors
question
Data flow diagram (DFD)
answer
illustrates the movement of information between external entities and the processes and data stores within the system
question
Data loss prevention (DLP)
answer
Prevention and resistance technologies stop intruders from accessing and reading data by means of content filtering, encryption, and firewalls -Time bombs:computer viruses that wait for a specific date before executing their instructions. -Content filtering: occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. -Encryption scrambles information into an alternative form that requires a key or password to decrypt -decrypt information: is to decode it and is the opposite of encrypt. -Cryptography: is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. -advanced encryption standard (AES) designed to keep government information secure -Public key encryption (PKE) uses two keys: a public key that everyone can have and a private key for only the recipient -certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates. -digital certificate is a data file that identifies individuals or organizations online and is comparable to a digital signature. -A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings. -Antivirus software scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware.
question
Data mining
answer
the process of analyzing data to extract information not offered by the raw data alone. Data mining can also begin at a summary information level (coarse granularity) and progress through increasing levels of detail (drilling down), or the reverse (drilling up). Data mining is the primary tool used to uncover business intelligence in vast amounts of data -Cluster analysis is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible -Association detection reveals the degree to which variables are related and the nature and frequency of these relationships in the information. -Statistical analysis performs such functions as information correlations, distributions, calculations, and variance analysis
question
Data storage, data center, data mart vs. data warehouse
answer
Data Warehouse: is a logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks Data Mart:contains a subset of data warehouse information. To distinguish between data warehouses and data marts, think of data warehouses as having a more organizational focus and data marts as having focused information subsets particular to the needs of a given business unit such as finance or production and operations Data Center:A data center is a facility used to house management information systems and associated components, such as telecommunications and storage systems. -sometimes referred to as server farms, consume power and require cooling and floor space while working to support business growth without disrupting normal business operations and the quality of service.
question
Data vs information vs knowledge
answer
Data:are raw facts that describe the characteristics of an event or object Information:is data converted into a meaningful and useful context. Knowledge:includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources.
question
Data-driven website
answer
is an interactive website kept constantly updated and relevant to the needs of its customers using a database -content creator is the person responsible for creating the original website content. -content editor is the person responsible for updating and maintaining website content. -Static information includes fixed data incapable of change in the event of a user action. -Dynamic information includes data that change based on user actions.
question
Database
answer
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
question
Database field, attribute, entity, and table
answer
A data element (or data field) is the smallest or basic unit of information. Data elements can include a customer's name, address, email, discount rate, entity (also referred to as a table) stores information about a person, place, thing, transaction, or event Attributes (also called columns or fields) are the data elements associated with an entity.
question
Database Management System (DBMS) - MS Access, MySQL
answer
creates, reads, updates, and deletes data in a database while controlling access and security. Managers send requests to the DBMS, and the DBMS performs the actual manipulation of the data in the database
question
Decision-making and problem solving stages
answer
Problem Identification, Data Collection, Solution Generation, Solution Test, Solution Selection, Solution Implementation Operational: employees develop, control, and maintain core business activities required to run the day-to-day operations. Operational decisions are considered structured decisions, which arise in situations where established processes offer potential solutions Managerial:employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.semistructured decisions; they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision Strategic: managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.unstructured decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice
question
Digital Rights Management (DRM), Software Piracy
answer
-DRM is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. -Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. -Counterfeit software is software that is manufactured to look like the real thing and sold as such.
question
Disaster recovery
answer
-disaster recovery plan, which is a detailed process for recovering information or a system in the event of a catastrophic disaster. -Hot Site: a separate and fully equipped facility where the company can move immediately after a disaster and resume business -Cold Site: a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster -Warm Site: a separate facility with computer equipment that requires installation and configuration
question
Disintermediation
answer
The introduction of ebusiness brought about disintermediation, which occurs when a business sells directly to the customer online and cuts out the intermediary -taking out the middleman
question
Documentation (software)
answer
is created that highlights how to use the system and how to troubleshoot issues or problems. Training is also provided for the system users and can take place online or in a classroom.
question
Domain Name System (DNS)
answer
-identifies a URL address and in the previous example apple, .com is the domain name
question
Drill-down report capabilities
answer
lets managers view monthly, weekly, daily, or even hourly information
question
Hardware
answer
The physical devices associated with a computer system -Central Processing Unit -Input Device (keyboard, mouse, scanner) -Output Device (monitor, printer, headphones) -Storage Device (DVD, memory stick, hard drive) -Communication Device (modem, wireless card) -Connecting device (Cables)
question
Hypertext Markup Language (HTML)
answer
on website (raw material website built on)
question
Middleware
answer
integration software that help input/output information connect/convert software
question
Networking protocols (e.g. what is a protocol, TCP/IP)
answer
TCP/IP =most on the internet which do you use when you search the web?-HTTP
question
RFID
answer
Radio Frequency Identification -technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. -Tag: a microchip hold data, in this case an EPC (electronic Product code), a set of numbers to a unique item -Reader: uses radio waved to read the tag and sends the EPC to computers in the supply chain Computer Network: each computer in the supply chain recognizes the EPC and pulls up informaiton related to the item (dates made and shipped, price, and directions for use, from a server maintained by the manufacture) -RFID in the Retail Supply Chain (manufacture-; distribution center-; store-; home)
question
Business Model
answer
B2B B2C
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New