Upgrade to remove ads
Terms in this set (84)
What is MIS?
Management Information Systems- the management and use of information systems that help organizations achieve there strategies.
The Five-compoment model
Hardware, Software, Data, procedures, People
-Components of an information system
The difference between IT and IS
The difference is that IT drives the development of new information systems.
IT can be bought IS cannot.
information Technology- refers to the products, methods inventions and standards that are used for the purpose of producing information.
+hardware, software, and data components.
Information systems- is an assembly of hardware, software, data, procedures, and people that produce information.
What is Information?
Information is -knowledge derived from data, where as data is defined as recorded facts or figures.
- data presented in a meaningful context.
-is data processed by summing, ordering, averaging, grouping, comparing or other similar operations.
- a difference that makes a difference.
data is defined as recorded facts or figures.
Characteristics of Data
-Relevant to context and subject
-Just barely sufficient
-Worth its cost
What are the difference between routine and non-routine skills.
Routines skills are skills that everyone can do.
Non-Routine skills are skills that people must learn to do. it doesn't come naturally.
What is Collaboration?
as a group of people working together to achieve a common goal, via a process of feedback and iteration.
Key characteristics and successful criteria of collaboration?
1. enthusiastic about subject of collaboration.
2. open minded and curious
3. speaks their mind even is its unpopular.
4. gets back to people in timely manner
5.enters into difficult convos
6. perseptive listener
7. skillful n giving and receiving negative feedback
8. willing to put forward unpopular ideas
9. self managing
10. following through on commitments
11. is willing to dig into the topic with zeal
12. brings different perspectives
Understand the different types of decisions.
+allocation one utilization of resources
+broad scope, organizational issues.
What are the different phases of projects?
Collaboration and team communication.
Understand how five forces determine industry structure.
1.Baragining power of customers
2.Threat of substitutions
3. Bargaining power of suppliers
4. threat of new entrants
How industry structure determine competitive strategy?
an organization responds to the structure of its industry by choosing a competitive strategy. the 5 course model with the model of four competitive strategies.
Competitive structure and value chain.
Understand details of value chain
-a network of value creating activities.
how do business processes generate value?
by transforming inputs into outputs.
`How do IS provide competitive advantages?
Know hardware components, types of hardware, and computer data.
How can hardware affect competitive strategies?
new and changing hardware can represent potential opportunities or threats to their ability to generate revenue.
Understand software terminology and concepts.
What is open source software?
open sources software means that the source code of the program is available to the public.
Differences between native and web applications.
Native application- a thick-client application that is designed to work with particular operating system and sometimes further limited to work only with a particular mobile device that runs on operating systems.
Web applications- thin client application is designed to run within a computer browser such as Firefox, Chrome, Opera, or Internet explorer.
Challenges of mobile devices at work.
The challenges are:
-Loss of control
-work never ends
What is the purpose of a database?
Database- is a self-describing collection of integrated records.
The purpose of a database is to keep track of things. It is used when something has multiple themes.
What is metadata?
metabase- is data that describes data.
Understand the components of a database - byte, row, columns, table, relationships
byte- is a character of data
row- called records,left side
columns- called fields, top
Table/ file- a group of similar rows/records
What are primary keys and foreign keys?
PK- is a column or group of columns that identifies a unique row in a table.
FK- the columns that fulfill a role
What is data integrity issue?
What is DBMS?
Database management system- is a program used to create, process, and administer a database.
Details of database applications.
is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data.
Issues with multiuser processing.
Lost-update problem- exemplifies one of the special characteristics if multiuser database processing.
- prevent it by some type of locking must be used to coordinate the activities of users who know nothing about one another.
Tasks of a database administrator.
- create and staff DBA function
- form steering committee
- specify requirements
-validate data model
-evaluate application design
- manage processing rights and responsibilities
- manage security
track problems and manage resolution
- track problems and manage resolution
-monitor database performance
-monitor backup procedures
-set up request tracking system
- Manage configuration change
How to create data models? Know how to use ERD.
How is data model transformed to database design?
DM -> DBD by converting the DM into tables, relationships, and data constraints.
transforms entities into tables.
What is the cloud?Characteristic of the cloud?
a term that refers to elastic leasing of pooled computers resources over the internet.
Why is the cloud making a presence now?
Cloud is making a presents because people need more storage and companies want more data.
when does the cloud not make sense?
-when law or standard industry practice require physical control or possession of the data
- financial institution might be legally required to maintain physical control over its data.
Network technology that support the cloud
The internet -- Networks or networks
Local area neteork (LAN)-- COMPUTER CONNECTED AT A S9ingle physical site
Wide area network (WAN) computers connected between two or more separated sites.
How the cloud work? particularly on three-tier architecture and SOA.
-The cloud would not exist with out SOA
What is web services and its supporting protocols?
-In SOA interactions among computing devices are
defined as services in a formal, standardized way
Cloud services from cloud vendors.
securing cloud services.
Being a perceptive listener is more important for a collaborator than being gregarious and dynamic. T or F
Operational decisions concern the allocation and utilization of resources. t or f
Need for collaboration increases as the decisions become more structured. t or f
Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication. t or f
Collaboration systems should ideally store data on team member's devices, rather than on servers. t or f
Which of the following is a key difference between collaboration and cooperation?
Unlike cooperation, collaboration emphasizes iteration and feedback.
Which of the following is the most important trait that an effective collaborator should have?
skillfulness at giving/receiving negative feedback
Kyra, an inventory manager, orders 500 units of Type-2 steel beams for the current month from the company's usual vendor. In doing so, she has made a(n) ________ decision.
Identify a key difference between managerial decisions and operational decisions.
Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities.
An organization establishes team roles, responsibilities, and authorities for the project team. The project is in the ________ phase of project management.
The competitive strategy of an organization is determined by its value chain. t or f
In the context of Porter's five forces model, the bargaining power of suppliers (auto dealers) is a weak force when considering the example of auto dealers setting the price of new cars in which consumers are unable to verify the 'true price' of vehicles. t or f
Zulily, a specialized clothing and accessories website for women and mothers, is an example of 'following an industry-wide cost leadership strategy'. t or f
In the value chain, customer service is concerned with inducing or persuading buyers to purchase the product and providing means for them to do so. t or f
The cost of a business process is the cost of the inputs plus the cost of the activities. t or f
Amazon, an e-business retailer, has started to offer business intelligence services known as AWS (Amazon Web Services). By doing this, Amazon has ________ (Choose the best answer).
introduced product differentiation
1-Click, also called one-click or one-click buying, is the technique of allowing customers to make online purchases with a single click. This is an example of obtaining competitive advantage by ________.
locking in customers
Which of the following principles of competitive advantage is related to process implementations?
The material ordering process can be classified under ________.
Which of the following statements is true of business process designs?
Most process designs require people to work in new ways.
The CPU is a computer that is designed to support processing requests from many remote computers and users. t or f
Server virtualization is a technology for hosting several different operating systems for a desktop. t or f
Native applications are programs that are written to use a particular operating system. t or f
A BYOD policy is a statement concerning employees' permissions and responsibilities when they use their company's devices for organizational business. t or f
Horizontal-market applications are developed for specific, unique needs of an industry. t or f
t or f Users do not need to load firmware into a device's memory.
Which of the following statements is true about closed source projects?
Only trusted programmers are allowed to make changes to a closed source project.
Which of the following is an example of vertical-market application software?
inventory tracking software for an automobile manufacturer
Which of the following is an example of nonvolatile memory?
Bits are used for computer data because they ________.
are easy to represent physically
The purpose of a database is to keep track of lists of data that involve a single theme. t or f
Structured Query Language (SQL) is an international standard language for processing a database. t or f
A data model describes data and relationships that will be stored in the database. t or f
A foreign key is essential in relational databases to represent the relationship between two tables. t or f
The general goal of normalization is to convert poorly structured tables into two or more well-structured tables. t or f
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.
Which of the following refers to the problem that exists in database applications when two users modify the same data item, but only one of those changes is recorded?
lost update problems
Which of the following is false about components in an E-R diagram?
1:N is a many-to-many relationships.
_________ is a program used to create, process, and administer a database.
You might also like...
K201 Lecture Exam 1
IST 202 Chapter 6
Other sets by this creator
Strategic Feminist Communication Exam 2
Strategy Unit 1
Strategic Feminist Communication Exam 1
Other Quizlet sets
Last Structures Test
Chemistry Final Exam