• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/158

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

158 Cards in this Set

  • Front
  • Back
What is an information system?
a group of components that interact to produce information
what is information?
information is changed when facts/ data are put into meaningful and useful data
Process of an information system
data --> information --> knowledge --> wisdom
information has to have
context
five fundamental components of an information system?
1. computer hardware
2. software
3. data
4. procedures
5. people
five components of IS (computer side)
hardward, software
five components of IS (human side)
procedures, people
bridge between five components of an IS
data
what is MIS?
management information system
MIS is
devolopment and use of information systems that help businesses achieve goals and objectives
Key elements of MIS (3)
1. development and use
2. information systems
3. business goals and objectives
business professionals need to:
(5)
1. take an active role in IS to ensure that systems meet their needs
2. understand how IT systems are constructed
3. consider users' needs during development
4. learn how to employ IT systems
5. take into account ancillary IT functions (security, backup and maintenance)
MIS achieving business goals (2)
- MIS aids in achieving businesses' objectives
- MIS empowers users to achieve business objectives
Business people must ask questions (5)
1. what will system do for us
2. what is its purpose
3. what will using it enable us to do?
4. what goals can we accomplish through its use?
5. how will it aid us in reaching our objectives
How does IT differ from IS? (IT side)
IT includes (hardware, software, data components)

IT refers to
1. methods
2. inventions
3. standards
4. products
- alone will not help an organization achieve goals
"information tools"
How does IT differ from IS (IS side)
IS = IT plus people and procedures

IS makes IT useful
How do business professionals use IS?
- think creatively about problems, challenges, and opportunities and find ways to apply IT and IS
- create innovative applications using emerging (new) technologies
- find ways to gain a competitive advantage with information systems
five IS components to support a business
1. computer hardware
2. software
3. data
4. procedures
5. people
Basic Hardware Categories (IPOS)
1. input- keyboard, mouse, document scanners, bar-code scanners, etc.
2. processing- CPU "the brain", main memory and cache memory, special function cards
3. output- video displays, printers, audio speakers, overhead projectors, plotters
4. storage- magnetic disks , optical disks, magnetic tapes
Binary digits (bits)
-used to represent data (either zero or one)
sizing computer data
- bytes
- 8 bit chunk = 1 byte
- size of main memory, storage devices, etc.
byte
number of bits to represent one character
kilobyte
1,024 bytes (k)
megabyte
1,024 k = 1,048, 576 bytes (MB)
gigabyte
1.024 MB= 1.073,741,824 bytes (GB)
Terabyte
1.024 GB= 1,099,511, 627, 776 bytes (TB)
order of computer data size
byte --> kilobyte --> megabyte --> gigabyte --> terabyte
CPU
central processing unit
- transfers program or data from disk to main memory
moves instructions from main memory via data channel or Front Side Bus
- has small amount of fast memory called cache
main memory
- contains program instructions
- contains operating system instructions
RAM
random access memory
memory
- primary storage
- temporary
- volatile
- turn off computer and its erased
Operating System (OS)
- lays foundation then you put in Utility Software
- program that controls computer's resources and blocks of data
- provides services to application programs and users
Utility Software
-focus on how computer runs
- disk cleaners, defragmenters, archivers, anti-virus, etc
why does memory swapping occur?
- main memory is too small to hold all programs and data
- CPU loads programs from memory in chunks
- places new programs into unused memory
- if none available, the OS will remove chunk being used and replace with requested data
- slows down computer
difference between a client and a server
client- computers are used for word processing, spreadsheets, database access

servers- provide service to clients
- it's NOT a computer
- can have a computer with multiple server
- faster, larger, more powerful

computer can be a client and server at the same time
Grid computing
network of computers operating as if it is one computer
cloud computing
computing networks provided as a service on internet
- ex: facebook
two fundamental types of software
1. operating system
2. application programs
software constraints
1. operating systems
- run only on particular types of hardware
- must conform to instruction set of CPU
- windows works only on Intel instructions set CPUs

2. application programs
- written to use particular operating system
what are four major operating systems?
1. windows- XP, Vista, 7
2. Mac OS- leopard, snow leopard
3. Unix- more difficult, not for business users
4. Linux

can have more than one OS on a computer
four types of applications
1. Horizontal- market application software (word, excel, powerpoint, acrobat, photoshop, paint shop pro, pagemaker)

2. Vertical - market application software (appointment scheduling, tracking system for mechanics)

3. one-of-a-kind application software- designed for specific need
(IRS software)

4. hybrid application software- designed for large customer base but can be customized
3 ways organizations acquire application software
1. off-the-shelf (cheaper)
2. off-the-shelf with alterations
3. custom- developed software
- difficult and risky
- last choice if no other option
Firmware
computer software installed into devices
- stored on actual printer
difference between thick and thin client?
-thin client- extremely cheap, protects against vunerablilities when multiple people use them

- thick client- what we use
has more code to run on it
more features and functions
more expense and administration
viruses
-computer programs, copy themselves ,and use host to travel
- take unwanted and harmful actions
- consume computer resources
trojan horses
- viruses that masquerade as useful programs or files, such as games, MP3s, and so on
macro viruses
-attach to Word, Excel, and so on to infect documents
- infect every file the application creates or processes
worms
- computer programs that propagate using internet or network (dont need host to travel)
- prevent with patches
ways to prevent harmful files and viruses
- never download from unknown sites
- dont open attachements from strangers
- dont open unexpected attachments
- dont rely on file extension names
- purchase antivirus program to detect and eliminate viruses
what to do if you have a virus
- run anitvirus software or disinfect
- may need to delete by reformatting disk and reinstalling system and applications from clean sources
cache
a file on a domain name resolver that stores domain names and IP addresses that have been resolved.
volatile
data that will be lost when computer or device is not powered
bytes and hertz
bytes- storage
hertz- speed
e- commerce
buying and selling goods and services over public and private networks
categories of e- commerce
1. merchant- take title to goods they sell
2. non-merchant- arrage purchase or sale of goods and services owned and provided by others
business to consumer (B2C)
- web storefront
- customer enters storefront and manages creating own order
business to business (B2B)
sales between companies
business to government (B2G)
sales between government and business
disintermediation
elimination of middle layers in supply chain, especially wholesale and retail links
how does e- commerce improve market efficiency?
1. disintermediation
2. improved information on prices and terms
3. knowledge about price elasticity
4. advertising
5. messaging
economic factors in disintermediation
- channel conflict
- price conflict with existing channels
- logistics expenses increase for manufacturer
- customer- service expenses increase for manufacturer
three- tier architecture
1. user tier (web browser)
2. server tier ( web servers, application server)
3. database tier (DBMS server)
HTTP
hypertext transfer protocol- det of rules and regulations for transferring documents and data over internet
types of servers
- web server- program that runs on server tier computer, manages HTTP traffic by sending and receiving Web Pages

- Commerce server (application server)- application program run on server tier
web farm-
multiple server computers to minimize customer delays
VPN
virtual private network- called a secure tunnel
- dynamically generated network connection to connect users or nodes
encryption
- process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end
public key
known and used to scramble messages (SSL)
private key
not known and used by receiver to descramble
certificate authority
a third party that issues keys
Cable modem
uses cable tv coaxial cable to transmit the signal and can be used while simultaniously watching TV
- requires modem and offers speeds comparable to DSL
IoS
Internet over satellite- uses a satellite dish to connect a computer to the internet
- usually slower than land-based options (DSL, Cable)
Wireless
fixed wireless acces points allow computers with access cards to access ground-based networks
- mobile wireless devices can access networks using mobile wireless networks
Intranet
an internal, private network using Web technologies to securely transmit info with the oraganization
- limits viewing access to authorized users within the organization
benefits of extranet (similar to intranet)
- improved info access to authorized user
- improved timliness and accuracy of info
- global reach allowing employees access from anywhere
- cross- platform integration
- low cost deployment
- positive return on investment
HTML
hypertext markup language
- tag-based markup language like XML
- defines structure and layout of Web pages
hyperlinks
pointers to other web pages
attributes
a varaiable for formatting text
protocols
set of rules and regulations that accomplish tasks designed to its layer
SMTP
simple mail transfer protocol (ex: @ou.edu)
program
a specific computer product that implements a protocol (ex: a browser)
FTP
file transfer protocol
TCP
transmission control program (TCP)
- breaks email messages and attachments into segments
- ensures reliability that all segments are received
purpose of IP
IP (internet protocol)
- route messages across an internet
- packages each segment into a packet
- places IP data in front of TCP data on each packet
MAC vs. IP addresses
Mac
- physical addresses
- used to identify "illegal" activity

IP address
- logical address
- assigned
- used with networking
DNS
Domain Name System
- converts names into actual numericals (IP address)
know
. com
. edu
. gov
. org
. mil
company
education (university)
government
organization
U.S. military
what value does social networking add to business?
- us interacting
- companies encourage this
- viral "grass roots" marketing
SN
social networking- interaction of people connected by interests, friendships, business associations, or some other common trait that is supported by Web 2.0 technology
Viral marketing with SN
- more reliable
- reaches more people, faster, cheaper, and more personal
SN group
an association of SN members related to a particular topic, event, activity, or other collective interest
three types of SN groups
1. public- anyone can find the group by searching and anyone can join it
2. invitation- anyone can find the group by searching, but he or she must be invited to joing
3. private- group cannot be found by searching, and members must be invited to join
Social network application
computer program that interacts with and processes information in a social network
- runs on server
common types of UGC
User generated content
- ratings and surveys
- opinion
- customer stories
- discussion groups
- wikis
- blogs
-video
- crowdsourcing
crowdsourcing
using web 2.0 technology to leverage WWW users for solving problems
benefits of UGC
- SN users are three times more likely to trust peer's opions over advertiser claims
- increases loyalty
- increases brand involvement
- share advice and assistance
- provides useful info
impacts of UGC
- increases conversion rates
- conversion rates higher for products with less than perfect reviews than for products wiht no reviews at all
- post answers to questions
- eventually may cause return rates to fall
- videos- bait for advertising
risks of UGC
- junk and crackpots
- inappropratiate content
- unfavorable reviews
- mutinous movements
- dependency on SN vendor
cookies
text files stored on computers from websites to be stored temporarily
- used to ID you --> personalize a website
privacy
-major issue with internet browsing
history
stored sites of websites you have visited
updates/ patches
want to have these
- plug that fixes a security issue
- keep stuff updated
security utilities
- anti-virus application
- norton, spybot, mcaffe- spam filters, antivirus
the wireless world
when you're on the internet you're transmitting information, if you're not on a secure network you want to encrypt
rules for creating a strong password
1. 7 or more characters
2. dont use real name or company name
3. do not use complete dictionary name
4. use different password for previous passwords used
5. use upper and lowercase letters, numbers, and special symbols
what is the purpose of a database?
- to organize and keep track of things
- keep lists that involve multiple themes/concepts
what does a database contain?
- self- describing collection of integrated records
- hierarchy of data elements
- collection of tables plus relationships among rows
database
structured collection of records or data that is stored in a computer system so that a computer program or person using a query language can consult it to answer questions
database technology
- a collection of related data organized in a way that makes it valuable and useful
- allows organizations to retrieve, store, and analyze information easily
- is vital to an organizations success in running operations and making decisions
importance of good database design
- poor design results in unwanted data redundancy: unnecessary duplication
- poor design generates errors leading to bad business decisions
-ensures data integrity
- ensures referential integrity
data resource management
the right information, to the right people, at the right time
when designing a database system
REFINE the database & create the database
- need to design THEN create
entities
(database)
- things we store information about (persons, places, things)
- have relationships to other entities
attributes
- these are pieces about an entity
- describe the entitiy (characteristics)
primary key
a unique attribute type used to identify a single instance of an entity
foreign key
a field(s) that points to a primary key in another table and ensures referential instance of an entity
compound primary key
a unique combination of attributes types used to identify a single instance of an enitity (multi-field primary key)
secondary key
an attribute that can be used to identify one or more records within a table with a given value
Levels of a DBMS (database management system)
(lowest)
Field- individual charaacteristics about an ENTITY (also attributes or columns)

Record- a group of fields or attributes to describe a single instance of an ENTITY ( also called rows)

Table- collection of records or instances for a given ENTITY (sometimes called files)

Database- collection of tables or entities containing information to support a given system or a particular topic area
(HIGHEST)
field naming conventions
- make sense
- identify the table/entity
- maintain reasonable efficiency
Table
= file = entity
Column
field= attribute
Row
record=instance
relationships among records
values in one table may relate to rows/records in other tables
keys
columns that identify unique row in table
- each table has a key
foreign keys (of a database)
keys of a different table than the one in which they reside
relational databases
databases using tales, keys, and foreign keys
data model
a map or diagram that represents entities and their relationships
ERD
entity relationship diagram
(example of Data model)

- also example of METADATA
relationship cardinality notation
- mandatory one
- mandatory many
- optional one
- optional many
ERD
example of metadata
data normalization
technique used to make complex databases more efficient by eliminating as much redundant data as possible
metadata
database is self-describing
- data that describe data
- make databases more useful
- make databases easier to use
data dictionary
-document database designers use- aids development and use of database
- provides several pieces of info about each attribute in the database
data mining
- method companies use to analyze info to better understand their customers, products, markets, or any other phrase of their business for which they have data
- allows us to do things that humans couldnt do on their own (a LOT of math)
what is DBMS and what does it do?
(Database management system)
program that creates, processes, and administers database
- creates tables, relationships in databases
four DBMS operations
- read data
- insert data
- modify data
- delete data
forms
used to read, insert, modify, and delete data
reports
-show data in structured rows
- may compute values
queries
are a means of getting answers from database data
lost- update problem
occurs when an update made by a transaction is lost due to an update made by another transaction
locking
"ticketmaster"
- used to ensure that a transaction does not interfere with any other transaction. Prevents problem of lost update, uncommitted data, and inconsistent data
what is difference between Enterprise DBMS and a Personal DBMS?
the size
(enterprise much larger!)- used for business
Why learn collaboration skills?
-key business skill in the 21st century
- distributed collaborative terms are becoming increasingly common
- collaboration skils will help project teams beome more productive, do better work, and waste less time
What is collaboration?
- collaboration occurs when two or more people work together to achieve a common goal, result, or work product
- NOT the same as cooperation
- takes several weeks
two key elements to communication
1. communication skills and group member abilities
2. availability of effective communication systems
content management
-who made what changes,when, why?
- rights to create, edit, delete, and read-only content privleges may vary
workflow control
specifies ordering of tasks, processes for handling rejected changes and dealing with exceptions
- often not needed for one-time, ad hoc groups working on short-term project
hackman's three characteristics of team effectiveness:
1. accomplish goals and objective that satisfy sponsors and clients
2. over time, working together is easier and more effective
3. members learn and feel fulfilled
accomplish goals and objectives
team must create common understanding of goals and objectives
team member behavior influenced by:
- natural skills and abilities
- childhood formative environment
-past team experiences
- attitude and skill of team leader
- nature of the work and its relationship to member interests and abilities
Plavix
C new answer
three categories of content management and IT for sharing content:
1. no control- email with attachments, shared files on server
2. version management- wikis, google docs and spreadsheets, microsoft groove
3. version control- microsoft sharepoint
version management (wikis)
- shared knowledge management
- repository of team knowledge
- system tracks who created the entry and the date of the creation.
Google Docs and spreadsheets
- free
- save, edit files on google server
- users can access files at the same time
- googel merges changes into single document
- good for sharing a few word or excel documents
Microsoft office groove
- not as good as google docs
- user/ group workspace contains collection of tools, documents
- automatically notifies group members by instant message when files are added or edited
- must have groove installed on each member's computer
- good for virtual meetings with mult-party text chat
examples of version and document control applications
-microsoft share point-most popular for business use
- master control- document version control
- document locator- document version control
- subversion- software versioning tools
- CVS- software versioning tools
microsoft sharepoint
- good for compilicated projects
- large teams
- project managament