Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
78 Cards in this Set
- Front
- Back
System
|
A group of components that interact to achieve some purpose. 6
|
|
Information System (IS)
|
A group of components that interact to produce information. if it includes a computer, it's a "computer-based information system," not all systems require a computer
|
|
Five-Component Framework
|
The five fundamental components of an information system-computer hardware, software, data, procedures, and people-that are present in every information system, from the simplest to the most complex. 6
|
|
Computer Hardware
|
One of the five fundamental components of an information system. 6; example: when you use a computer ot write a report- storage disk, keyboard, monitor
|
|
Software
|
one of the five findamental components of an information system. 6; instructions for computers; example: word-processing programs
|
|
Data
|
one of the five fundamental components of an IS. 6; example: when writing a report, the words or sentences in the report
|
|
Procedures
|
one of the five fundmental components of an IS. 6; instructions for people, the methods use such as printing and saving
|
|
People
|
one of the five fundamental components of an IS. 6; YOU those who maintain data, operate hardware, and use the system
|
|
Management Information System (MIS)
|
Three key elements: development and use, IS, and business goals and objectives
|
|
Information Technology (IT)
|
raw technology; concernes only hardware, software, and data from an IS
|
|
Moore's Law
|
the speed of a cumputer chip doubles every 18 months; as a result the price/ performance ratio for computers has fallen dramatically for years
|
|
Collaboration
|
two or more people working together toward a common goal
|
|
Virtual Team
|
members reside in different geographic locations, sometimes never meeting, possible via communications media
|
|
Configuration Management
|
management process that controls and tracks changes to a shared work product; team members must follow procedures for checking documents in and out and for making changes to the work product. 322
|
|
Workflow Control
|
Use of software and IS to monitor the execution of a work team’s processes; ensures that actions are taken at appropriate times and prohibits the skipping of steps or tasks. 323
|
|
Knowledge Management (KM) System
|
The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital. 324
|
|
Business Process (System)
|
A network of activities, resources, facilities, and information that interact to achieve some business function; sometimes called a business system. 22; examples: inventory management processes, manufacturing processes, sales and inventory processes, etc.
|
|
Activities
|
transform resources and information of one type into resources and information of another type
|
|
Resources
|
items of value; external to organization; example: customers and suppliers
|
|
Facilities
|
structures used within the business process; example: trucks, databases, inventories, equipment, etc.
|
|
Information
|
(1) Knowledge derived from data, where data is defined as recorded facts or figures; (2) Data presented in a meaningful context; (3) Data processed by summing, ordering, averaging, grouping, comparing, or other similar operations; (4) A difference that makes a difference. 24
|
|
Data
|
recorded facts or figures, not meaningful on its own
|
|
Automated System
|
work formerly done by people followung procedures has been moved so that computers now do that work by following instructions in software
|
|
Structured Decision
|
an understood and accepted method for making a decision; example: a formula for computing the reorder quantity of an item in inventory
|
|
Unstructured Decision
|
process for which there is no agreed-on decision-making method, prediction methods vary from person to person, neither standarized nor broadly directed; example: predicting the future direction of the economy or the stock market
|
|
Automated IS
|
IS in which the hardware and software components do most of the work
|
|
Augmentation IS
|
IS in which humans do the bulk of the work; IS program exists to support work done by people; example: e-mail, IM, and videoconferencing
|
|
Margin
|
net benefit to the differentiation strategy
|
|
Value Chain
|
a network of value-creating activities; includes primary activities, support activities, and linkages
|
|
Primary Activities
|
Five Activities: inbound logistics, operations, outbound logistics, marketing and sales, and service; each stage of chain adds value to product; value is not only in the parts but also in the time required
|
|
Support Activities
|
Four Activities: firm infrastructure, human resources, technological development, procurement; contributes indirectly to production, sale, and service; add value and costs
|
|
Linkages
|
interactions across value activities; sources of efficiencies; reduces inventory costs
|
|
Switching Costs
|
making it difficult or expensive for customers or suppliers to switch to another product or organization
|
|
Knowledge Management (KM)
|
the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital;
|
|
Content Management Systems
|
IS that tracks organizational documents, Web pages, graphics, and related materials; store, manage, and deliver documents; example: Google
|
|
Expert Systems
|
codify knowledge into rules and processes those rules to give advice or guidance in the form of IF/THEN rules
|
|
Expert System Shells
|
the programs that process a set of rules; processes rules until no value changes, at that point, the values of all of the variables are reported as results; encodes the knowledge of highly-skilled experts and makes available to less-skilled professionals
|
|
Hardware
|
consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software
|
|
Special Function Cards
|
cards that can be added to the computer to augment the computer's basic capabilities; example:a card that provides enhanced clarity and refreshed speed for the computer's video display
|
|
Binary Digits (Bits)
|
used to represent data; either a zero or a one; easy to represent physically- either an open or closed switch, the orientation of a magnetic field, or optical media (certain reflections from burns on the surface of a disk) can represent a zero or a one
|
|
Data Channel (bus)
|
used to execute an instruction by moving the instruction from main memory in to the CPU
|
|
Cache
|
the CPU's very small amount of very fast memory; place where CPU keeps frequently used information
|
|
Operating System (OS)
|
a computer program that controls the computer's resource: it manages the contents of main memory, processes keystrokes and mouse movements, send signals to the display monitor, reads and writes disk files, and controls the processing of other programs
|
|
Memory Swapping
|
the movement of programs and data into and out of memory. If a computer has insufficient memory for its workload, such swapping will degrade system performance
|
|
Client
|
a computer that provides word processing, spreadsheets, database access, and usually a network connection
|
|
Server
|
a computer that provides some type of service, running a blog, publishing a web site, or selling goods. This type of computer is faster, larger, and more powerful than client computers.
|
|
Server Farm
|
a large collection of server computers that coordinates the activities of the servers, usually for commercial purposes
|
|
Instruction Set
|
The collection of instructions that a computer (CPU) can process.
|
|
WIndows
|
An operating system designed and sold by Microsoft. It is the most widely used operating system; easily hacked because so widely used; on 95% of business desks
|
|
MAC OS
|
An operating system developed by Apple Computer, Inc. for the Macintosh. The current version is Mac OS X. Macintosh computers are used primarily by graphic artists and workers in the arts community. Mac OS was developed for the PowerPC, but as of 2006 will run on Intel processors as well.
|
|
Unix
|
An operating system developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then.
|
|
Linux
|
A version of Unix that was developed by the opensource community. The open-source community owns Linux, and there is no fee to use it. Linux is a popular operating system for Web servers.
|
|
License
|
Agreement that stipulates how a program can be used. Most specify the number of computers on which the program can be installed and sometimes the number of users that can connect to and use the program remotely. Such agreements also stipulate limitations on the liability of the software vendor for the consequences of errors in the software.
|
|
Application Software
|
Programs that perform a business function. Some application programs are general purpose, such as Excel or Word. Other application programs are specific to a business function, such as accounts payable.
|
|
Horizontal-Market Application Software
|
Software that provides capabilities common across all organizations and industries; examples include word processors, graphics programs, spreadsheets, and presentation programs.
|
|
Vertical-Market Application Software
|
Software that serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients, those used by auto mechanics to keep track of customer data and customers' automobile repairs, and those used by parts warehouses to track inventory, purchases, and sales.
|
|
One-of-a-kind Application Software
|
Software that is developed for a specific, unique need, usually for a particular company’s operations.
|
|
Off-the-Shelf, Off-the-Shelf with Alterations, or Custom Developed Software
|
tailor made software
|
|
Firmware
|
Computer software that is installed into devices like printers, print services, and various types of communication devices. The software is coded just like other software, but it is installed into special, programmable memory of the printer or other device.
|
|
Thin Client
|
A software application that requires nothing more than a browser and can be run on only the user’s computer; preferred because do not require the installation and administration
|
|
Thick Client
|
A software application that requires programs other than just the browser on a user’s computer—that is, that requires code on both a client and server computers; provides features and functions that more than compensate for the expense and administration of their installation
|
|
Virus
|
a computer program that replicates itself; consumes computer resources
|
|
Payload
|
causes unwanted activity; can delete programs or data, or modify data in undetected ways, or published data in harmful ways such as sending credit card data to unauthorized sites
|
|
Trojan Horse
|
virus that masquerades as useful programs or files, typically appears to be a computer game, MP3 music file, or some other useful, innocuous program
|
|
Macro Viruses
|
viruses that attach themselves to Word, Excel, or other types of documents; when infected document is opened, the virus places itself in the startup files of the application the infects every file the application processes or creates
|
|
Worm
|
virus that propagates using internet or network; specifically programmed to spread, chokes networks until network is unusable
|
|
Patches
|
A group of fixes for high-priority failures that can be applied to existing copies of a particular product. Software vendors supply patches to fix security and other critical problems.
|
|
Antivirus Programs
|
Software that detects and possibly eliminates viruses; problem: if virus unknown to that program than the virus will go undetected
|
|
Keys
|
column(s) that identify unique row in table; each table has a key
|
|
Foreign Keys
|
keys in a different table than in the one in which they reside
|
|
Relational Database
|
databases that carry their data in the form of tables and that represent relationships using foreign keys and keys
|
|
Metadata
|
"data that describes data," a database that contains within itself is description of its data, depends on the software product that is processing the database
|
|
Database Management System (DBMS)
|
A software program used to create, process, and administer a database; usually licensed from vendors; different from a database; used to (1) create tables and relationships in databases and (2) process database and (3) provide tools to assist in database administration
|
|
Structured Query Language (SQL)
|
an international standard language for processing a database
|
|
Database Application
|
a collection of forms, reports, queries, and application programs that process a database; database may have one or more applications, and each application may have one or more users
|
|
Multiuser Processing
|
hen multiple users process the database at the same time; common; unique problems: lost-update problem, "locking" must be used to coordinate
|
|
Enterprise DBMS
|
process large organizational and workgroup databases; support many users; support 24/7 operations; example: DB2, SQL Server, Oracle
|
|
Personal DBMS
|
designed for smaller, simpler database applications; supports fewer than 100 users; examples: Access, dBase, FoxPro, Paradox
|