• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/163

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

163 Cards in this Set

  • Front
  • Back
Information Technology (IT)
-A field concerned with the use of technology in managing and processing information
Management Information Systems (MIS)
-A general name for the business function and academic discipline covering the application of people, technologies, and procedures--collectively called information systems--to solve business problems
Data
-Raw facts that describe the characteristics of an event
Information
-Data converted into a meaningful and useful context
Business Intelligence
-Refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts
Competitive Advantage
-A product or service that an organization's customers place a greater value on than similar offerings from a competitor
First-move Advantage
-Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage
Environmental Scanning
-The acquisition and analysis of events and trends in the environment external to an organization
Five Forces Model
-Helps determine the relative attractiveness of an industry and includes the following five forces: buyer power, supplier power, threat of substitute products or services, threat of new entrants, & rivalry among existing competitors
Buying Power
-Assessed by analyzing the ability of buyers to directly impact the price they are willing to pay for an item
Switching Cost
-Costs that can make customers reluctant to switch to another product or service
Loyalty Programs
-Reward customers based on the amount of business they do with a particular organization
Supply Chain
-Consists of all parties involved, directly, or indirectly, in the procurement of a product or raw material
Supplier Power
-Assessed by the suppliers' ability to directly impact the price they are charging for supplies
Threat of Substitue Products or Services
-High when there are many alternatives to a product or service and low when there are few alternatives from which to choose
Threat of New Entrants
-High when it is easy for new competitors to enter a market and low when there are significant entry barriers to entering a market
Entry Barrier
-A product or service feature that customers have come to expect from organizations
Rivalry Among Existing Competitors
-High when competition is fierce in a market and low when competition is more complacent
Product Differentiation
-Occurs when a company develops unique differences in its products with the intent to influence demand
Three Generic Strategies
-Broad cost leadership, broad differentiation, focused strategy
A Business Process
-A standardized set of activities that accomplish a specific task, such as processing a customer's order
Value Chain
-Views an organization as a series of processes, each of which adds value to the product or service for each customer
Supply Chain Management (SCM)
-Involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
Four Basic Components of Supply Chain Management
-Supply chain strategy, supply chain partners, supply chain operation, supply chain logistics
Customer Relationship Management (CRM)
-Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
Business Process Reengineering (BPR)
-The analysis and redesgin of workflow within and between enterprises
Enterprise Resource Planning (ERP)
-Integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations
Key Performance Indicators (KPI)
-The measures that are tied to business drives. Metrics are the detailed measures that feed those KPIs
Efficiency IT Metrics
-Measures the performance of the IT system itself including throughput, speed, and availability
Effectiveness IT Metrics
-Measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases
Benchmarks
-Baseline values the system seeks to attain
Benchmarking
-A process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance
Balanced Scorecard
-A management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action
Chief Information Officer (CIO)
-Responsible for overseeing all uses of information technology and ensuring the strategic alignement of IT with business goals and objectives
Chief Technology Officer (CTO)
-Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology
Chief Security Officer (CSO)
-Responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses
Chief Privacy Officier (CPO)
-Responsible for ensuring the ethical and legal use of information within an organization
Chief Knowledge Officer (CKO)
-Responsible for collecting, maintaining, and distributing the organization's knowledge
Ethics
-The principles and standards that guide our behavior toward other people
Privacy
-The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
Information Security
-A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Information Granularity
-Refers to the extent of detail within the information (fine and detailed or coarse and abstract)
Transactional Information
-Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks
Analytical Information
-Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks
Real-Time Information
-Immediate, up-to-date information
Real-Time Systems
-Provide real-time information in response to query requests
Five Characteristics of High Quality Information
-Accuracy, Completeness, Consistency, Uniqueness, Timeliness
Database
-Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
Hierarchical Database Model
-Information is organized into a tree-like structure that allows repeating information using parent/child relationships in such a way that it cannot have too may relationships
Network Database Model
-A flexible way of representing objets and their relationships
Relational Database Model
-A type of database that stores information in the form of logically related two-dimensional tables
Entity
-A person, place, thing, transaction, or event about which information is stored
Attributes
-Characteristics or properties of an entity class
Primary Key
-A field (or group of fields) that uniquely identifies a given entity in a table
Foreign Key
-A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
Physical View
-The physical storage of information on a storage device such as a hard disk
Logical View
-Focuses on how users logically access information to meet their particular business needs
Scalability
-How well a system can adapt to increased demands
Performance
-Measures how quickly a system performs a certain process or transaction
Redundancy
-The duplication of information, or storing the same information in multiple places
Information Integrity
-A measure of the quality of information
Integrity Constraints
-Rules that help ensure the quality of information
Relational Integrity Constraints
-Rules that enforce basic and fundamental information-based constraints
Business-Critical Integrity Contraints
-Enforce business rules vital to an organization's success and ofter require more insight and knowledge than relational integrity contraints
Database Management Systems (DBMS)
-Software though which users and application programs interact with a database
Data-Driven Website
-An interactive website kept constantly updated and relavant to the needs of its customers through the use of a database
Integration
-Allows separate systems to communicate directly with each other
Forward Integration
-Takes information entered into a given system and sends it automatically to all downstream systems and processes
Backward Integration
-Takes information entered into a given system and sends it automatically to all upstream systems and processes
Data Warehouse
-A logical collection of information--gathered from many different operational databases--that supports business analysis activities and decision-making tasks
Extraction, Transformation, and Loading (ETL)
-A process that extracts information form internal and external databases, transformes the information using a common set of enterprise definitions, and loads the information into a data warehouse
Data Mart
-Contains a subset of data warehouse information
Cube
-The common term for the representation of multidimensional information
Data Mining
-The process of analyzing data to extract information not offered by the raw data alone
Data-Mining Tools
-A variety of techniques to find patterns and relationships in large volumes of information and infer rules form them that predict future behavior and guide decision making
Information Cleansing or Scrubbing
-A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
Business Intelligence (BI)
-Refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts
Information technology (IT)
-A field concerned with the use of technology in
managing and processing information
Hardware
-Consists of the physical
devices associated with a computer system
Software
-The set of instructions that
the hardware executes to carry out specific tasks
Computer
-An electronic device operating under the control of instructions
stored in its own memory that can accept, manipulate, and store data
Central Processing Unit (CPU) or Microprocessor
-The actual hardware
that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
Control Unit
-Interprets software instructions and literally tells the other hardware
devices what to do, based on the software instructions
Arithmetic-Logic Unit (ALU)
-Performs all arithmetic operations (for example, addition and subtraction)
and all logic operations (such as sorting and comparing numbers)
Megahertz (MHz)
-The number of millions of CPU cycles per second
Gigahertz (GHz)
-The number of billions of CPU cycles per second
Complex Instruction Set Computer (CISC) Chips
-A type of CPU that can
recognize as many as 100 or more instructions, enough to carry out most computations directly
Reduced Instruction Set Computer (RISC) Chips
-Limit the number of
instructions the CPU can execute to increase processing speed
Virtualization
-A protected memory space
created by the CPU allowing the computer to create virtual machines
Primary Storage
-The computer’s main memory, which consists of the
random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
Random Access Memory (RAM)
-The computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external
data bus
Volatility
-Refers to RAM's complete loss of stored information if power is interrupted
Cache Memory
-A small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this
data from slower memory circuits such as RAM
Read-Only Memory (ROM)
-The portion of a computer’s primary storage that does
not lose its contents when one switches off the power
Flash Memory
-A special type of rewriteable read-only memory (ROM) that
is compact and portable
Memory Cards
-Contain high-capacity storage that holds data such as captured images, music, or text files
Memory Sticks
-Provide nonvolatile memory for a range of portable devices including computers, digital cameras, MP3 players, and PDAs
Secondary Storage
-Consists of equipment designed to store large volumes of data for long-term storage
Megabyte (MB or M or Meg)
-Roughly 1 million bytes
Gigabyte (GB)
-Roughly 1 billion bytes
Terabyte (TB)
-Roughly 1 trillion bytes
Magnetic Medium
-A secondary storage medium that uses magnetic techniques
to store and retrieve data on disks or tapes coated with magnetically sensitive
materials
Magnetic Tape
-An older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium
Hard Drive
-A secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed
together with the recording heads in a hermetically sealed mechanism
Input Device
-Equipment used to capture information and commands
Output Device
-Equipment used to see, hear, or otherwise accept the results
of information processing requests
Communication Device
-Equipment used to send
information from one location and receive it at another
System Software
-Controls how the various technology tools work together along with the application software
Operating System Software
-Controls the application software and manages how the hardware devices work together
Multitasking
-Allows more than one piece of software to be used at a time
Utility Software
-Provides additional functionality to the operating system
Application software
-Used for specific information processing needs, including
payroll, customer relationship management, project management, training, and
many others
Four Types of IT Culture
-Information-functional culture, information-sharing culture, information-inquiring culture, information-discovery culture
Information-Functional Culture
-Employees use information as a means of exercising influence or power over others
Information-Sharing Culture
-Employees across departments trust each other to use information (especially about problems and failures) to improve performance
Information-Inquiring Culture
Employees across departments search for information to better understand the failure and align themselves with current trends and new directions
Information-Discovery Culture
-Employees across departments are open to new insights about crises and radical changes and seek ways to create competitive advantages
Supply Chain Strategy
-The strategy for managing all the resources required to meet customer demand for all products and services
Supply Chain Partners
-The partners choses to deliver finished products, raw materials, and services including pricing, delivery, and payment processes along with partner relationship monitoring metrics
Supply Chain Operation
-The schedule for production activities including testing, packaging, and preparation for delivery. Measurements for this component include productivity and quality
Supply Chain Logistics
-The product delivery processes and elements including orders, warehouses, carriers, defective product returns, and invoicing
Six Types of Efficiency IT Metrics
-Throughput, transaction speed, system availability, information accuracy, web traffic, & response time
Throughput
-The amount of information that can travel through a system at any point
Transaction Speed
-The amount of time a system takes to perform a transaction
System Availability
-The number of hours a system is available for users
Information Accuracy
-The extent to which a system generates the correct results when executing the same transaction numerous times
Web Traffic
-Includes a host of benchmarks such as the the number of page views, the number of unique visitors, and the average time spent viewing a web page
Response Time
-The time it takes to respond to user interactions such as a mouse click
Four Types of Effectiveness IT Metrics
-Usability, customer satisfaction, conversion rates, financial
Usability
-The ease with which people perform transactions and/or find information. A popular usability metric on the internet is degrees of freedom, which measures the number of clicks required to find desired information
Customer Satisfaction
-Measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars pr customer
Conversion Rates
-The number of customers an organization "touches" for the first time and persuades to purchase its products or services. This is a popular metric for evaluating the effectiveness of banner, pop-up , and pop-under ads on the internet
Financial
-Such as return on investment (the earning power of an organization's assets), cost-benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break-even analysis (the point at which constant revenues equal ongoing costs)
Types of Website Metrics
-Abandoned registrations, abandoned shopping carts, click-through, conversion rate, cost-per-thousand (cpm), page exposures, total hits, unique visitors
Types of Customer Relationship Management Metrics
-Number of prospective customers, number of open leads, amount of new revenue, cases closed same day, number of service calls, customer satisfaction level, customer retention rate, new customer retention rates, number of marketing campaigns
Relational Database Advantages
-Increased flexibility, increased scalability and performance, reduced information redundancy, increased information integrity (quality), increased information security
Types of Operating System Software
-Linux, Mac OS X, Microsoft Windows, MS-DOS, & UNIX
Types of Application Software
-Browser (Google Chrome), communication, data management (Microsoft Access), desktop publishing (Adobe FrameMaker), email (Microsoft Outlook), groupware, presentation graphics (Microsoft PowerPoint), programming (Java), spreadsheet (Microsoft Excel), & word processing (Microsoft Word)
Types of Utility Software
-Crash-proof, disk image for data recovery, disk optimization, encrypt data, file and data recovery, text protect, preventative security, spyware, uninstaller
Linux
-An open source operating system that provides a rich environment for high-end workstations and network servers. Open source refers to any program whose source code is made available for use or modification as users or other developers see fit
Mac OS X
-The operating system of Macintosh computers
Microsoft Windows
-Generic name for the various operating systems in the Microsoft Windows
family, including Microsoft Windows CE, Microsoft Windows 98, Microsoft
Windows ME, Microsoft Windows 2000, Microsoft Windows XP, Microsoft
Windows NT, and Microsoft Windows Server 2003
MS-DOS
-The standard, single-user operating system of IBM and IBM-compatible
computers, introduced in 1981. MS-DOS is a command-line operating
system that requires the user to enter commands, arguments, and syntax
UNIX
-A 32-bit multitasking and multiuser operating system that originated at AT&T’s Bell Laboratories and is now used on a wide variety of computers, from mainframes to PDAs
Crash-Proof
-Helps save information if a computer crashes
Disk Image for Data Recovery
-Relieves the burden of reinstalling and tweaking scores of applications if a hard drive crashes or becomes irretrievably corrupted
Disk Optimization
-Organizes information on a hard disk in the most efficient way
Encrypt Data
-Protects confidential information from unauthorized eyes. Programs such as BestCrypt simply and effectively apply one of several powerful encryption schemes to hard drive information. Users unlock the information by entering a password in the BestCrypt control panel. The
program can also secure information on rewritable optical disks or any other storage media that is assigned a drive letter
File and Data Recovery
-Retrieves accidental deletion of photos or documents in Windows XP by utilities such as Free Undelete, which searches designated hard drive deletion areas for recognizable data
Text Protect
-In Microsoft Word, prevents users from typing over existing text after accidentally hitting the Insert key. Launch the Insert Toggle Key program, and the PC will beep whenever a user presses the Insert key
Preventative Security
-Through programs such as Window Washer, erases file histories, browser cookies, cache contents, and other crumbs that applications and Windows leave on a hard drive
Spyware
-Removes any software that employs a user’s Internet connection in the background without the user’s knowledge or explicit permission
Uninstaller
-Can remove software that is no longer needed
Browser
-Enables the user to navigate the World Wide Web. The two leading browsers are Netscape Navigator and Microsoft Internet Explorer
Communication
-Turns a computer into a terminal for transmitting data to and receiving data from distant computers through the telephone system
Data Management
-Provides the tools for data retrieval, modification, deletion, and insertion; for example, Access, MySQL, and Oracle
Desktop Publishing
-Transforms a computer into a desktop publishing workstation. Leading packages include Adobe FrameMaker, Adobe PageMaker, and QuarkXpress
Email
-Provides email services for computer users, including receiving mail, sending mail, and storing messages. Leading email software includes Microsoft Outlook, Microsoft Outlook Express, and Eudora
Groupware
-Increases the cooperation and joint productivity of small groups of co-workers
Presentation Graphics
-Creates and enhances charts and graphs so that they are visually appealing and easily understood by an audience. A full-features presentation graphics package such as Lotus Freelance Graphics or Microsoft
PowerPoint includes facilities for making a wide variety of charts and graphs and for adding titles,
legends, and explanatory text anywhere in the chart or graph
Programming
-Possesses an artificial language consisting of a fixed vocabulary and a set of rules (called syntax) that
programmers use to write computer programs. Leading programming languages include Java, C++, C#, and .NET
Spreadsheet
-Simulates an accountant’s worksheet onscreen and lets users embed hidden formulas that perform calculations on the visible data. Many spreadsheet programs also include powerful graphics and presentation capabilities to create attractive products. The leading spreadsheet application is Microsoft Excel
Word Processing
-Transforms a computer into a tool for creating, editing, proofreading, formatting, and printing documents. Leading word processing applications include Microsoft Word and WordPerfect