Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
143 Cards in this Set
- Front
- Back
system
|
group of components that interact to achieve some purposes
|
|
information system (IS)
|
group of components that interact to produce information (and their assembly) [CAN'T be bought]
|
|
management information system (MIS)
|
management & use of information systems that help businesses archive strategies
|
|
5 components of IS
|
hardware, software, data, procedures, people
|
|
most important component of an IS
|
people
|
|
information technology (IT)
|
products, methods, inventions, and standards used to produce information (only hardware, software, and data) [CAN be bought]
|
|
5 traits of good information
|
accurate, timely, relevant, sufficient enough, worth its cost
|
|
Porter's 5 forces
|
bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry amongst firms
|
|
4 competitive strategies (Porter's)
|
cost, differentiation, industry-wide, focus
|
|
value
|
money customer is willing to pay
|
|
margin
|
difference between value of activity and cost of activity
|
|
value-chain
|
network of value-making activities
|
|
activities in value-chain
|
inbound logistics, operations/manufacturing, outbound logistics, sales & marketing, customer service
|
|
support activities
|
procurement, technology, human resources, firm infrastructure
|
|
central idea of business process data
|
do not automate or improve, but create new processes
|
|
business process
|
network of activities that generate value by transforming inputs into outputs
|
|
cost = ?
|
cost of inputs + cost of activities
|
|
margin = ?
|
value of outputs - cost
|
|
input hardware (examples)
|
keyboard, mouse, document scanners, bar-code scanners
|
|
central processing unit (CPU)
|
selects instructions, processes them, and performs arithmetic and logical comparisons and stores results in memory
|
|
dual processor
|
computer w/ 2 CPUs
|
|
quad processor
|
computer w/ 4 CPUs
|
|
main memory
|
CPU reads data & instructions from memory, and stores results of computations in main memory
|
|
random access memory (RAM)
|
main memory
|
|
output hardware (examples)
|
video displays, printers, speakers, projectors
|
|
storage hardware
|
saves data and programs, magnetic disks
|
|
universal serial bus (USB)
|
simplified connecting peripheral gear to computers
|
|
how data is represented on computers
|
binary digits (bits)
|
|
binary digits (bits)
|
used for computer data b/c they are easy to represent electronically
|
|
volatile memory
|
lost when computer powers off (cache and main memory)
|
|
nonvolatile memory
|
survive computer powering off
|
|
client computer
|
for word processing, spreadsheets, database access, etc. also can connect to networks
|
|
server computers
|
provide some service
|
|
operating system (OS)
|
computer program that controls a computer's resources
|
|
application programs
|
programs that perform a business function (general or business)
|
|
3 main operating systems
|
Microsoft Windows, Mac OS, Unix
|
|
versions of Microsoft Windows
|
windows 7, windows vista, windows XP
|
|
versions of Mac OS
|
OS X lion, mountain lion
|
|
version of Unix made by open source community
|
Linux
|
|
categories of application software
|
nonmobile client OS's, mobile client OS's, servers
|
|
database
|
self-describing collection of integrated records; keeps track of data
|
|
primary key
|
column/group of columns that identifies unique row in table
|
|
foreign key
|
columns that fulfill a role
|
|
metadata
|
data that describes data
|
|
database management system (DBMS)
|
program used to create, process, and administer a database
|
|
popular DBMS's
|
DB2 (IBM), Access, SQL (Microsoft), Oracle (Oracle)
|
|
database application
|
collection of forms, reports, queries, and app programs that process a database
|
|
forms are used to ___?
|
read, insert, modify, and delete data
|
|
reports show data ____?
|
in a structured context
|
|
queries _____?
|
request data from a database
|
|
enterprise DBMS
|
process large organization and workgroup databases; can support thousands of users
|
|
personal DBMS
|
made for smaller and simpler database apps; less than 100 users, usually less than 15
|
|
data model
|
logical representation of database data (blueprint to building)
|
|
entity-relationship data model
|
used for contrasting data models
|
|
normalization
|
process of converting a poorly structured table into 2+ good ones
|
|
data integrity problem
|
when data items disagree with one another
|
|
relational database
|
carry their data in the form of tables and represent relationships using foreign keys
|
|
users in the database development process _____?
|
define what database must contain, review data models for accuracy, and give final approval of data models
|
|
network
|
collection of computers that communicate with each other via transmission lines or wirelessly
|
|
local area network (LAN)
|
connects computers in one geographic location
|
|
wide area network (WAN)
|
connects computers at different geographical locations
|
|
internet
|
network of networks
|
|
internat
|
private internet used within organization
|
|
components of wired LAN
|
small office/home office (SOHO), network interface card (NIC), unshielded twisted pair (UTP) cable
|
|
small office/home office (SOHO)
|
less than 12 computers and printers, communicate via wired and wireless connections
|
|
network interface card (NIC)
|
connects computer or printer's circuitry to network wires
|
|
unshielded twisted pair (UTP) cable
|
wires twisted in a way that improves signal quality
|
|
access point
|
component of LAN that processes wireless traffic and communicates with wired switch
|
|
IEEE 802.3 protocol
|
ethernet; used for LAN connections; which wire carries which signal
|
|
IEEE 802.11 protocol
|
for wireless connections
|
|
bluetooth
|
common wireless connection protocol, made for transmitting data over short distances
|
|
internet service provider (ISP)
|
provides you with legitimate internet address, gateway to internet
|
|
modem
|
converts computer's digital data into signals that can be transmitted over cable lines
|
|
DSL modems
|
operate on same lines as voice telephones but do not interfere
|
|
cable modems
|
high-speed data transmission using cable television lines
|
|
5 protocol type layers
|
top layer: protocols for apps like browsers and web servers
middle 2 layers: protocols about data communications across internet last 2 layers: protocols about data transmission within network |
|
packet
|
piece of message that is handled by programs that implement IP
|
|
router
|
special-purpose computer that moves packet traffic according to IP protocol
|
|
IP address
|
number that identifies a particular IP
|
|
public IP address
|
identify device on public network, assignment is controlled by public agency
|
|
private IP address
|
identify device on private network, usually on LAN, assignment is controlled with LAN
|
|
virtual private network (VPN)
|
uses internet to create appearance of private connections
|
|
3-tier architecture for web apps
|
user tier, server tier, database tier
|
|
user tier
|
computers, phones
|
|
server tier
|
computers that run web servers and process app programs
|
|
database tier
|
computers that run DBMS that processes requests to get and store data
|
|
hypertext markup language (HTML)
|
most common language for defining structure and layout of webpages
|
|
tag
|
notation used to define a data element for display or otherwise
|
|
attribute
|
variable used to provide properties about a tag
|
|
href
|
attribute for hyperlink, indicates which webpage to display upon clicking of link
|
|
XML
|
markup language that fixes several HTML deficiencies and is commonly used for interaction via web
|
|
flash
|
(adobe) add-on used for providing animation, movies, and other advanced graphics
|
|
silverlight
|
microsoft's equivalent of flash
|
|
HTML 5
|
new HTML, supports animation, movies and graphics
|
|
cloud
|
elastic leasing of pooled computer resources over internet
|
|
3 factors that have made cloud possible
|
processors, data communication, and data storage very cheap
virtualization technology enables instantaneous creation of new virtual machine new internet-based protocols enable cloud hosting vendors to provide processing capabilities |
|
software as a service (SaaS)
|
provides hardware, infrastructure, OS and app programs (salesforce.com)
|
|
platform as a service (PaaS)
|
vendors provide hosted computers, OS, and maybe a DBMS (microsoft windows azure)
|
|
infrastructure as a service (IaaS)
|
cloud hosting of a bare server computer or disk drive (amazon ec2)
|
|
information silo
|
condition when data are isolated in seperate information systems
|
|
information silos cause _____?
|
data duplication, inconsistency, disjointedness, limited information, etc.
|
|
fundamental problem w/ info silos
|
data duplicated in isolated systems
|
|
4 customer life cycle phases
|
marketing, customer acquisition, relationship management, loss
|
|
enterprise resource planning (ERP)
|
suite of modules, database and a set of inherent processes for consolidating business ops into 1 platform
|
|
ERP system
|
information system based on technology (primary job is integration)
|
|
the database in an ERP solution____?
|
houses all activity processed by ERP application programs and consolidated data
|
|
4 challenges of implementing new enterprise systems
|
collaborative management, requirement gaps, transition problems, employee resistance
|
|
business intelligence (BI)
|
patterns, relationships, trends, predictions
|
|
BI system
|
information systems that process operational and other data to identify things for use by workers
|
|
3 primary activities of BI process
|
acquire data, BI analysis, publish results
|
|
data warehouse
|
facility for managing organization's BI data
|
|
data mart
|
subset of warehouse, addresses particular component of business
|
|
business process
|
network of activities, roles, resources, and data that interact to accomplish function
|
|
role
|
collection of activities
|
|
resource
|
people or apps assigned to roles
|
|
data flows
|
movement of data between activities
|
|
4 stages of BPM process
|
model processes, create components, implement processes, assess results
|
|
system development
|
process of creating and maintaining an IS
|
|
composition of a development team for an IS
|
manager, business analysts, system analysts, programmers, software testers, users
|
|
system conversion
|
implies process of converting business activity from old to new system
|
|
4 types of system conversion
|
pilot, phase, parallel, plunge
|
|
pilot conversion
|
new system fully implemented
|
|
phase conversion
|
implemented in phases
|
|
parallel conversion
|
new system runs like old one until new one is properly tested
|
|
plunge conversion
|
completely shut off old system and start new one
|
|
5 challenges of system development
|
determining requirements, changing requirements, schedule/budget problems, changing technology, diseconomies of scale
|
|
4 factors for development project management
|
coordination, diseconomies of scale, configuration control, unexpected events, team morale
|
|
threat
|
party that seeks to get data/assets illegally
|
|
safeguard
|
attempt to stop threats
|
|
3 sources of security threats
|
human error, computer crime, natural events/disasters
|
|
denial of service (DOS)
|
human error in following procedure
|
|
3 key elements of security policy
|
general statement, issue (specify policy), system-specific policy
|
|
encryption
|
process of transforming clear text into code
|
|
symmetric encryption
|
one key used
|
|
asymmetric encryption
|
one key for encoding, one for decoding
|
|
virus
|
self replicating computer program
|
|
trojan horse
|
viruses masqueraded as useful/helpful
|
|
worm
|
virus propagates using internet or network
|
|
spyware
|
observe user's actions and reports them to sponsoring organization
|
|
adware
|
watches user activity and produces pop-up ads
|
|
key escrow
|
when data is encrypted, trusted party has copy of encryption key
|
|
hot site
|
utility company that can take over other company's processing easily, expensive
|
|
cold site
|
provide computers and office space where customers install and manage systems themselves
|