• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/143

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

143 Cards in this Set

  • Front
  • Back
system
group of components that interact to achieve some purposes
information system (IS)
group of components that interact to produce information (and their assembly) [CAN'T be bought]
management information system (MIS)
management & use of information systems that help businesses archive strategies
5 components of IS
hardware, software, data, procedures, people
most important component of an IS
people
information technology (IT)
products, methods, inventions, and standards used to produce information (only hardware, software, and data) [CAN be bought]
5 traits of good information
accurate, timely, relevant, sufficient enough, worth its cost
Porter's 5 forces
bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry amongst firms
4 competitive strategies (Porter's)
cost, differentiation, industry-wide, focus
value
money customer is willing to pay
margin
difference between value of activity and cost of activity
value-chain
network of value-making activities
activities in value-chain
inbound logistics, operations/manufacturing, outbound logistics, sales & marketing, customer service
support activities
procurement, technology, human resources, firm infrastructure
central idea of business process data
do not automate or improve, but create new processes
business process
network of activities that generate value by transforming inputs into outputs
cost = ?
cost of inputs + cost of activities
margin = ?
value of outputs - cost
input hardware (examples)
keyboard, mouse, document scanners, bar-code scanners
central processing unit (CPU)
selects instructions, processes them, and performs arithmetic and logical comparisons and stores results in memory
dual processor
computer w/ 2 CPUs
quad processor
computer w/ 4 CPUs
main memory
CPU reads data & instructions from memory, and stores results of computations in main memory
random access memory (RAM)
main memory
output hardware (examples)
video displays, printers, speakers, projectors
storage hardware
saves data and programs, magnetic disks
universal serial bus (USB)
simplified connecting peripheral gear to computers
how data is represented on computers
binary digits (bits)
binary digits (bits)
used for computer data b/c they are easy to represent electronically
volatile memory
lost when computer powers off (cache and main memory)
nonvolatile memory
survive computer powering off
client computer
for word processing, spreadsheets, database access, etc. also can connect to networks
server computers
provide some service
operating system (OS)
computer program that controls a computer's resources
application programs
programs that perform a business function (general or business)
3 main operating systems
Microsoft Windows, Mac OS, Unix
versions of Microsoft Windows
windows 7, windows vista, windows XP
versions of Mac OS
OS X lion, mountain lion
version of Unix made by open source community
Linux
categories of application software
nonmobile client OS's, mobile client OS's, servers
database
self-describing collection of integrated records; keeps track of data
primary key
column/group of columns that identifies unique row in table
foreign key
columns that fulfill a role
metadata
data that describes data
database management system (DBMS)
program used to create, process, and administer a database
popular DBMS's
DB2 (IBM), Access, SQL (Microsoft), Oracle (Oracle)
database application
collection of forms, reports, queries, and app programs that process a database
forms are used to ___?
read, insert, modify, and delete data
reports show data ____?
in a structured context
queries _____?
request data from a database
enterprise DBMS
process large organization and workgroup databases; can support thousands of users
personal DBMS
made for smaller and simpler database apps; less than 100 users, usually less than 15
data model
logical representation of database data (blueprint to building)
entity-relationship data model
used for contrasting data models
normalization
process of converting a poorly structured table into 2+ good ones
data integrity problem
when data items disagree with one another
relational database
carry their data in the form of tables and represent relationships using foreign keys
users in the database development process _____?
define what database must contain, review data models for accuracy, and give final approval of data models
network
collection of computers that communicate with each other via transmission lines or wirelessly
local area network (LAN)
connects computers in one geographic location
wide area network (WAN)
connects computers at different geographical locations
internet
network of networks
internat
private internet used within organization
components of wired LAN
small office/home office (SOHO), network interface card (NIC), unshielded twisted pair (UTP) cable
small office/home office (SOHO)
less than 12 computers and printers, communicate via wired and wireless connections
network interface card (NIC)
connects computer or printer's circuitry to network wires
unshielded twisted pair (UTP) cable
wires twisted in a way that improves signal quality
access point
component of LAN that processes wireless traffic and communicates with wired switch
IEEE 802.3 protocol
ethernet; used for LAN connections; which wire carries which signal
IEEE 802.11 protocol
for wireless connections
bluetooth
common wireless connection protocol, made for transmitting data over short distances
internet service provider (ISP)
provides you with legitimate internet address, gateway to internet
modem
converts computer's digital data into signals that can be transmitted over cable lines
DSL modems
operate on same lines as voice telephones but do not interfere
cable modems
high-speed data transmission using cable television lines
5 protocol type layers
top layer: protocols for apps like browsers and web servers

middle 2 layers: protocols about data communications across internet

last 2 layers: protocols about data transmission within network
packet
piece of message that is handled by programs that implement IP
router
special-purpose computer that moves packet traffic according to IP protocol
IP address
number that identifies a particular IP
public IP address
identify device on public network, assignment is controlled by public agency
private IP address
identify device on private network, usually on LAN, assignment is controlled with LAN
virtual private network (VPN)
uses internet to create appearance of private connections
3-tier architecture for web apps
user tier, server tier, database tier
user tier
computers, phones
server tier
computers that run web servers and process app programs
database tier
computers that run DBMS that processes requests to get and store data
hypertext markup language (HTML)
most common language for defining structure and layout of webpages
tag
notation used to define a data element for display or otherwise
attribute
variable used to provide properties about a tag
href
attribute for hyperlink, indicates which webpage to display upon clicking of link
XML
markup language that fixes several HTML deficiencies and is commonly used for interaction via web
flash
(adobe) add-on used for providing animation, movies, and other advanced graphics
silverlight
microsoft's equivalent of flash
HTML 5
new HTML, supports animation, movies and graphics
cloud
elastic leasing of pooled computer resources over internet
3 factors that have made cloud possible
processors, data communication, and data storage very cheap

virtualization technology enables instantaneous creation of new virtual machine

new internet-based protocols enable cloud hosting vendors to provide processing capabilities
software as a service (SaaS)
provides hardware, infrastructure, OS and app programs (salesforce.com)
platform as a service (PaaS)
vendors provide hosted computers, OS, and maybe a DBMS (microsoft windows azure)
infrastructure as a service (IaaS)
cloud hosting of a bare server computer or disk drive (amazon ec2)
information silo
condition when data are isolated in seperate information systems
information silos cause _____?
data duplication, inconsistency, disjointedness, limited information, etc.
fundamental problem w/ info silos
data duplicated in isolated systems
4 customer life cycle phases
marketing, customer acquisition, relationship management, loss
enterprise resource planning (ERP)
suite of modules, database and a set of inherent processes for consolidating business ops into 1 platform
ERP system
information system based on technology (primary job is integration)
the database in an ERP solution____?
houses all activity processed by ERP application programs and consolidated data
4 challenges of implementing new enterprise systems
collaborative management, requirement gaps, transition problems, employee resistance
business intelligence (BI)
patterns, relationships, trends, predictions
BI system
information systems that process operational and other data to identify things for use by workers
3 primary activities of BI process
acquire data, BI analysis, publish results
data warehouse
facility for managing organization's BI data
data mart
subset of warehouse, addresses particular component of business
business process
network of activities, roles, resources, and data that interact to accomplish function
role
collection of activities
resource
people or apps assigned to roles
data flows
movement of data between activities
4 stages of BPM process
model processes, create components, implement processes, assess results
system development
process of creating and maintaining an IS
composition of a development team for an IS
manager, business analysts, system analysts, programmers, software testers, users
system conversion
implies process of converting business activity from old to new system
4 types of system conversion
pilot, phase, parallel, plunge
pilot conversion
new system fully implemented
phase conversion
implemented in phases
parallel conversion
new system runs like old one until new one is properly tested
plunge conversion
completely shut off old system and start new one
5 challenges of system development
determining requirements, changing requirements, schedule/budget problems, changing technology, diseconomies of scale
4 factors for development project management
coordination, diseconomies of scale, configuration control, unexpected events, team morale
threat
party that seeks to get data/assets illegally
safeguard
attempt to stop threats
3 sources of security threats
human error, computer crime, natural events/disasters
denial of service (DOS)
human error in following procedure
3 key elements of security policy
general statement, issue (specify policy), system-specific policy
encryption
process of transforming clear text into code
symmetric encryption
one key used
asymmetric encryption
one key for encoding, one for decoding
virus
self replicating computer program
trojan horse
viruses masqueraded as useful/helpful
worm
virus propagates using internet or network
spyware
observe user's actions and reports them to sponsoring organization
adware
watches user activity and produces pop-up ads
key escrow
when data is encrypted, trusted party has copy of encryption key
hot site
utility company that can take over other company's processing easily, expensive
cold site
provide computers and office space where customers install and manage systems themselves