Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
158 Cards in this Set
- Front
- Back
What is an information system?
|
a group of components that interact to produce information
|
|
what is information?
|
information is changed when facts/ data are put into meaningful and useful data
|
|
Process of an information system
|
data --> information --> knowledge --> wisdom
|
|
information has to have
|
context
|
|
five fundamental components of an information system?
|
1. computer hardware
2. software 3. data 4. procedures 5. people |
|
five components of IS (computer side)
|
hardward, software
|
|
five components of IS (human side)
|
procedures, people
|
|
bridge between five components of an IS
|
data
|
|
what is MIS?
|
management information system
|
|
MIS is
|
devolopment and use of information systems that help businesses achieve goals and objectives
|
|
Key elements of MIS (3)
|
1. development and use
2. information systems 3. business goals and objectives |
|
business professionals need to:
(5) |
1. take an active role in IS to ensure that systems meet their needs
2. understand how IT systems are constructed 3. consider users' needs during development 4. learn how to employ IT systems 5. take into account ancillary IT functions (security, backup and maintenance) |
|
MIS achieving business goals (2)
|
- MIS aids in achieving businesses' objectives
- MIS empowers users to achieve business objectives |
|
Business people must ask questions (5)
|
1. what will system do for us
2. what is its purpose 3. what will using it enable us to do? 4. what goals can we accomplish through its use? 5. how will it aid us in reaching our objectives |
|
How does IT differ from IS? (IT side)
|
IT includes (hardware, software, data components)
IT refers to 1. methods 2. inventions 3. standards 4. products - alone will not help an organization achieve goals "information tools" |
|
How does IT differ from IS (IS side)
|
IS = IT plus people and procedures
IS makes IT useful |
|
How do business professionals use IS?
|
- think creatively about problems, challenges, and opportunities and find ways to apply IT and IS
- create innovative applications using emerging (new) technologies - find ways to gain a competitive advantage with information systems |
|
five IS components to support a business
|
1. computer hardware
2. software 3. data 4. procedures 5. people |
|
Basic Hardware Categories (IPOS)
|
1. input- keyboard, mouse, document scanners, bar-code scanners, etc.
2. processing- CPU "the brain", main memory and cache memory, special function cards 3. output- video displays, printers, audio speakers, overhead projectors, plotters 4. storage- magnetic disks , optical disks, magnetic tapes |
|
Binary digits (bits)
|
-used to represent data (either zero or one)
|
|
sizing computer data
|
- bytes
- 8 bit chunk = 1 byte - size of main memory, storage devices, etc. |
|
byte
|
number of bits to represent one character
|
|
kilobyte
|
1,024 bytes (k)
|
|
megabyte
|
1,024 k = 1,048, 576 bytes (MB)
|
|
gigabyte
|
1.024 MB= 1.073,741,824 bytes (GB)
|
|
Terabyte
|
1.024 GB= 1,099,511, 627, 776 bytes (TB)
|
|
order of computer data size
|
byte --> kilobyte --> megabyte --> gigabyte --> terabyte
|
|
CPU
|
central processing unit
- transfers program or data from disk to main memory moves instructions from main memory via data channel or Front Side Bus - has small amount of fast memory called cache |
|
main memory
|
- contains program instructions
- contains operating system instructions |
|
RAM
|
random access memory
|
|
memory
|
- primary storage
- temporary - volatile - turn off computer and its erased |
|
Operating System (OS)
|
- lays foundation then you put in Utility Software
- program that controls computer's resources and blocks of data - provides services to application programs and users |
|
Utility Software
|
-focus on how computer runs
- disk cleaners, defragmenters, archivers, anti-virus, etc |
|
why does memory swapping occur?
|
- main memory is too small to hold all programs and data
- CPU loads programs from memory in chunks - places new programs into unused memory - if none available, the OS will remove chunk being used and replace with requested data - slows down computer |
|
difference between a client and a server
|
client- computers are used for word processing, spreadsheets, database access
servers- provide service to clients - it's NOT a computer - can have a computer with multiple server - faster, larger, more powerful computer can be a client and server at the same time |
|
Grid computing
|
network of computers operating as if it is one computer
|
|
cloud computing
|
computing networks provided as a service on internet
- ex: facebook |
|
two fundamental types of software
|
1. operating system
2. application programs |
|
software constraints
|
1. operating systems
- run only on particular types of hardware - must conform to instruction set of CPU - windows works only on Intel instructions set CPUs 2. application programs - written to use particular operating system |
|
what are four major operating systems?
|
1. windows- XP, Vista, 7
2. Mac OS- leopard, snow leopard 3. Unix- more difficult, not for business users 4. Linux can have more than one OS on a computer |
|
four types of applications
|
1. Horizontal- market application software (word, excel, powerpoint, acrobat, photoshop, paint shop pro, pagemaker)
2. Vertical - market application software (appointment scheduling, tracking system for mechanics) 3. one-of-a-kind application software- designed for specific need (IRS software) 4. hybrid application software- designed for large customer base but can be customized |
|
3 ways organizations acquire application software
|
1. off-the-shelf (cheaper)
2. off-the-shelf with alterations 3. custom- developed software - difficult and risky - last choice if no other option |
|
Firmware
|
computer software installed into devices
- stored on actual printer |
|
difference between thick and thin client?
|
-thin client- extremely cheap, protects against vunerablilities when multiple people use them
- thick client- what we use has more code to run on it more features and functions more expense and administration |
|
viruses
|
-computer programs, copy themselves ,and use host to travel
- take unwanted and harmful actions - consume computer resources |
|
trojan horses
|
- viruses that masquerade as useful programs or files, such as games, MP3s, and so on
|
|
macro viruses
|
-attach to Word, Excel, and so on to infect documents
- infect every file the application creates or processes |
|
worms
|
- computer programs that propagate using internet or network (dont need host to travel)
- prevent with patches |
|
ways to prevent harmful files and viruses
|
- never download from unknown sites
- dont open attachements from strangers - dont open unexpected attachments - dont rely on file extension names - purchase antivirus program to detect and eliminate viruses |
|
what to do if you have a virus
|
- run anitvirus software or disinfect
- may need to delete by reformatting disk and reinstalling system and applications from clean sources |
|
cache
|
a file on a domain name resolver that stores domain names and IP addresses that have been resolved.
|
|
volatile
|
data that will be lost when computer or device is not powered
|
|
bytes and hertz
|
bytes- storage
hertz- speed |
|
e- commerce
|
buying and selling goods and services over public and private networks
|
|
categories of e- commerce
|
1. merchant- take title to goods they sell
2. non-merchant- arrage purchase or sale of goods and services owned and provided by others |
|
business to consumer (B2C)
|
- web storefront
- customer enters storefront and manages creating own order |
|
business to business (B2B)
|
sales between companies
|
|
business to government (B2G)
|
sales between government and business
|
|
disintermediation
|
elimination of middle layers in supply chain, especially wholesale and retail links
|
|
how does e- commerce improve market efficiency?
|
1. disintermediation
2. improved information on prices and terms 3. knowledge about price elasticity 4. advertising 5. messaging |
|
economic factors in disintermediation
|
- channel conflict
- price conflict with existing channels - logistics expenses increase for manufacturer - customer- service expenses increase for manufacturer |
|
three- tier architecture
|
1. user tier (web browser)
2. server tier ( web servers, application server) 3. database tier (DBMS server) |
|
HTTP
|
hypertext transfer protocol- det of rules and regulations for transferring documents and data over internet
|
|
types of servers
|
- web server- program that runs on server tier computer, manages HTTP traffic by sending and receiving Web Pages
- Commerce server (application server)- application program run on server tier |
|
web farm-
|
multiple server computers to minimize customer delays
|
|
VPN
|
virtual private network- called a secure tunnel
- dynamically generated network connection to connect users or nodes |
|
encryption
|
- process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end
|
|
public key
|
known and used to scramble messages (SSL)
|
|
private key
|
not known and used by receiver to descramble
|
|
certificate authority
|
a third party that issues keys
|
|
Cable modem
|
uses cable tv coaxial cable to transmit the signal and can be used while simultaniously watching TV
- requires modem and offers speeds comparable to DSL |
|
IoS
|
Internet over satellite- uses a satellite dish to connect a computer to the internet
- usually slower than land-based options (DSL, Cable) |
|
Wireless
|
fixed wireless acces points allow computers with access cards to access ground-based networks
- mobile wireless devices can access networks using mobile wireless networks |
|
Intranet
|
an internal, private network using Web technologies to securely transmit info with the oraganization
- limits viewing access to authorized users within the organization |
|
benefits of extranet (similar to intranet)
|
- improved info access to authorized user
- improved timliness and accuracy of info - global reach allowing employees access from anywhere - cross- platform integration - low cost deployment - positive return on investment |
|
HTML
|
hypertext markup language
- tag-based markup language like XML - defines structure and layout of Web pages |
|
hyperlinks
|
pointers to other web pages
|
|
attributes
|
a varaiable for formatting text
|
|
protocols
|
set of rules and regulations that accomplish tasks designed to its layer
|
|
SMTP
|
simple mail transfer protocol (ex: @ou.edu)
|
|
program
|
a specific computer product that implements a protocol (ex: a browser)
|
|
FTP
|
file transfer protocol
|
|
TCP
|
transmission control program (TCP)
- breaks email messages and attachments into segments - ensures reliability that all segments are received |
|
purpose of IP
|
IP (internet protocol)
- route messages across an internet - packages each segment into a packet - places IP data in front of TCP data on each packet |
|
MAC vs. IP addresses
|
Mac
- physical addresses - used to identify "illegal" activity IP address - logical address - assigned - used with networking |
|
DNS
|
Domain Name System
- converts names into actual numericals (IP address) |
|
know
. com . edu . gov . org . mil |
company
education (university) government organization U.S. military |
|
what value does social networking add to business?
|
- us interacting
- companies encourage this - viral "grass roots" marketing |
|
SN
|
social networking- interaction of people connected by interests, friendships, business associations, or some other common trait that is supported by Web 2.0 technology
|
|
Viral marketing with SN
|
- more reliable
- reaches more people, faster, cheaper, and more personal |
|
SN group
|
an association of SN members related to a particular topic, event, activity, or other collective interest
|
|
three types of SN groups
|
1. public- anyone can find the group by searching and anyone can join it
2. invitation- anyone can find the group by searching, but he or she must be invited to joing 3. private- group cannot be found by searching, and members must be invited to join |
|
Social network application
|
computer program that interacts with and processes information in a social network
- runs on server |
|
common types of UGC
|
User generated content
- ratings and surveys - opinion - customer stories - discussion groups - wikis - blogs -video - crowdsourcing |
|
crowdsourcing
|
using web 2.0 technology to leverage WWW users for solving problems
|
|
benefits of UGC
|
- SN users are three times more likely to trust peer's opions over advertiser claims
- increases loyalty - increases brand involvement - share advice and assistance - provides useful info |
|
impacts of UGC
|
- increases conversion rates
- conversion rates higher for products with less than perfect reviews than for products wiht no reviews at all - post answers to questions - eventually may cause return rates to fall - videos- bait for advertising |
|
risks of UGC
|
- junk and crackpots
- inappropratiate content - unfavorable reviews - mutinous movements - dependency on SN vendor |
|
cookies
|
text files stored on computers from websites to be stored temporarily
- used to ID you --> personalize a website |
|
privacy
|
-major issue with internet browsing
|
|
history
|
stored sites of websites you have visited
|
|
updates/ patches
|
want to have these
- plug that fixes a security issue - keep stuff updated |
|
security utilities
|
- anti-virus application
- norton, spybot, mcaffe- spam filters, antivirus |
|
the wireless world
|
when you're on the internet you're transmitting information, if you're not on a secure network you want to encrypt
|
|
rules for creating a strong password
|
1. 7 or more characters
2. dont use real name or company name 3. do not use complete dictionary name 4. use different password for previous passwords used 5. use upper and lowercase letters, numbers, and special symbols |
|
what is the purpose of a database?
|
- to organize and keep track of things
- keep lists that involve multiple themes/concepts |
|
what does a database contain?
|
- self- describing collection of integrated records
- hierarchy of data elements - collection of tables plus relationships among rows |
|
database
|
structured collection of records or data that is stored in a computer system so that a computer program or person using a query language can consult it to answer questions
|
|
database technology
|
- a collection of related data organized in a way that makes it valuable and useful
- allows organizations to retrieve, store, and analyze information easily - is vital to an organizations success in running operations and making decisions |
|
importance of good database design
|
- poor design results in unwanted data redundancy: unnecessary duplication
- poor design generates errors leading to bad business decisions -ensures data integrity - ensures referential integrity |
|
data resource management
|
the right information, to the right people, at the right time
|
|
when designing a database system
|
REFINE the database & create the database
- need to design THEN create |
|
entities
|
(database)
- things we store information about (persons, places, things) - have relationships to other entities |
|
attributes
|
- these are pieces about an entity
- describe the entitiy (characteristics) |
|
primary key
|
a unique attribute type used to identify a single instance of an entity
|
|
foreign key
|
a field(s) that points to a primary key in another table and ensures referential instance of an entity
|
|
compound primary key
|
a unique combination of attributes types used to identify a single instance of an enitity (multi-field primary key)
|
|
secondary key
|
an attribute that can be used to identify one or more records within a table with a given value
|
|
Levels of a DBMS (database management system)
|
(lowest)
Field- individual charaacteristics about an ENTITY (also attributes or columns) Record- a group of fields or attributes to describe a single instance of an ENTITY ( also called rows) Table- collection of records or instances for a given ENTITY (sometimes called files) Database- collection of tables or entities containing information to support a given system or a particular topic area (HIGHEST) |
|
field naming conventions
|
- make sense
- identify the table/entity - maintain reasonable efficiency |
|
Table
|
= file = entity
|
|
Column
|
field= attribute
|
|
Row
|
record=instance
|
|
relationships among records
|
values in one table may relate to rows/records in other tables
|
|
keys
|
columns that identify unique row in table
- each table has a key |
|
foreign keys (of a database)
|
keys of a different table than the one in which they reside
|
|
relational databases
|
databases using tales, keys, and foreign keys
|
|
data model
|
a map or diagram that represents entities and their relationships
|
|
ERD
|
entity relationship diagram
(example of Data model) - also example of METADATA |
|
relationship cardinality notation
|
- mandatory one
- mandatory many - optional one - optional many |
|
ERD
|
example of metadata
|
|
data normalization
|
technique used to make complex databases more efficient by eliminating as much redundant data as possible
|
|
metadata
|
database is self-describing
- data that describe data - make databases more useful - make databases easier to use |
|
data dictionary
|
-document database designers use- aids development and use of database
- provides several pieces of info about each attribute in the database |
|
data mining
|
- method companies use to analyze info to better understand their customers, products, markets, or any other phrase of their business for which they have data
- allows us to do things that humans couldnt do on their own (a LOT of math) |
|
what is DBMS and what does it do?
|
(Database management system)
program that creates, processes, and administers database - creates tables, relationships in databases |
|
four DBMS operations
|
- read data
- insert data - modify data - delete data |
|
forms
|
used to read, insert, modify, and delete data
|
|
reports
|
-show data in structured rows
- may compute values |
|
queries
|
are a means of getting answers from database data
|
|
lost- update problem
|
occurs when an update made by a transaction is lost due to an update made by another transaction
|
|
locking
|
"ticketmaster"
- used to ensure that a transaction does not interfere with any other transaction. Prevents problem of lost update, uncommitted data, and inconsistent data |
|
what is difference between Enterprise DBMS and a Personal DBMS?
|
the size
(enterprise much larger!)- used for business |
|
Why learn collaboration skills?
|
-key business skill in the 21st century
- distributed collaborative terms are becoming increasingly common - collaboration skils will help project teams beome more productive, do better work, and waste less time |
|
What is collaboration?
|
- collaboration occurs when two or more people work together to achieve a common goal, result, or work product
- NOT the same as cooperation - takes several weeks |
|
two key elements to communication
|
1. communication skills and group member abilities
2. availability of effective communication systems |
|
content management
|
-who made what changes,when, why?
- rights to create, edit, delete, and read-only content privleges may vary |
|
workflow control
|
specifies ordering of tasks, processes for handling rejected changes and dealing with exceptions
- often not needed for one-time, ad hoc groups working on short-term project |
|
hackman's three characteristics of team effectiveness:
|
1. accomplish goals and objective that satisfy sponsors and clients
2. over time, working together is easier and more effective 3. members learn and feel fulfilled |
|
accomplish goals and objectives
|
team must create common understanding of goals and objectives
|
|
team member behavior influenced by:
|
- natural skills and abilities
- childhood formative environment -past team experiences - attitude and skill of team leader - nature of the work and its relationship to member interests and abilities |
|
Plavix
|
C new answer
|
|
three categories of content management and IT for sharing content:
|
1. no control- email with attachments, shared files on server
2. version management- wikis, google docs and spreadsheets, microsoft groove 3. version control- microsoft sharepoint |
|
version management (wikis)
|
- shared knowledge management
- repository of team knowledge - system tracks who created the entry and the date of the creation. |
|
Google Docs and spreadsheets
|
- free
- save, edit files on google server - users can access files at the same time - googel merges changes into single document - good for sharing a few word or excel documents |
|
Microsoft office groove
|
- not as good as google docs
- user/ group workspace contains collection of tools, documents - automatically notifies group members by instant message when files are added or edited - must have groove installed on each member's computer - good for virtual meetings with mult-party text chat |
|
examples of version and document control applications
|
-microsoft share point-most popular for business use
- master control- document version control - document locator- document version control - subversion- software versioning tools - CVS- software versioning tools |
|
microsoft sharepoint
|
- good for compilicated projects
- large teams - project managament |