CINS Final Flashcards

1
Q

Reasons for Productivity Paradox (4)

A

Measurement, time lags, redistribution, mismanagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reason for productivity paradox #1: Measurement

A

firms are measuring the wrong things. They are measuring system efficiency when they should be measuring system effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

system efficiency

A

to extent to which a system enables a firm to do things faster or cheaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

system effectiveness

A

to extent to which a system enables a firm to accomplish goals and tasks well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reason for productivity paradox #2: Time Lags

A

benefits are felt long after initial investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reason for productivity paradox #3: Redistribution

A

when looking from a large scale, IS systems don’t seem to enhance the overall picture. But the new IS may benefit one firm, but not the market as a whole. (Some slices are getting bigger, but the whole pie’s not.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reason for productivity paradox #4: Mismanagement

A

Mismanagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

strategic necessity

A

something an organization must do in order to survive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

competitive pressures

A

force managers to invest in IS systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do you need a business case?

A

A strong business case aids the decision-making process and helps direct resources in more strategic ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 arguments of an IS business case

A

Faith, fear, facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Faith

A

no hard data, should clearly describe the firm’s mission and strategy. Based on beliefs about organizational strategy, comparative advantage, market share, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

fear

A

competition and rivalry in the industry, strategic necessities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

fact

A

cost-benefit analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cost-benefit analysis

A
  1. identifying costs (nonrecurring vs recurring) (tangible vs. intangible.)
  2. identifying benefits (tangible vs. intangible)
  3. perform cost-benefit analysis (break-even, net present-value)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCO

A

total cost of ownership (acquisition, use, maintenance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Weighted multicriteria analysis

A

a method for deciding among different investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How to present the business case

A
  1. Know your audience
  2. Convert benefits to monetary terms
  3. Use proxy variables (alternative measures of outcomes)
    - used to measure changes in terms of their perceived value to the organization
    - increases and decreases
  4. Measure what is important to management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Systems analysis and design

A

the process of designing, building, and maintaining IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Customized software

A

meets specific needs. Advantage is problem specificity (you only pay for what’s needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Off-the-shelf software

A

for common business processes. Less costly, faster, higher quality and less risky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

analysts and users must work together for a successful project

A

analysts and users must work together for a successful project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SDLC

A

Systems Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Steps of SDLC (5)

A
  1. Systems planning and selection
  2. Systems analysis
  3. Systems design
  4. Systems implementation and operation
  5. Systems maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Steps to Systems Analysis

A
  1. Determine requirements- requirements collection
  2. Modeling data- what data the IS needs to accomplish tasks
  3. Modeling processes and logic- data flows, processing logic
  4. Develop several different approaches (designs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

requirements collection

A

the process of gathering info to understand how the system should function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Joint Application Design (JAD)

A

a group meeting based process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

data flows

A

represent the movement of data through an organization or within an IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

processing logic

A

represents the way in which data is transformed (expressed in pseudocode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Systems Design

A

an approach is chosen and its details are elaborated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

3 parts of systems design

A
  1. human-computer interface
  2. databases and files
  3. designing processes and logic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

2 parts of systems implementation and operation

A
  1. Software programming and testing- transforming the system design into a working computer system and then testing it
  2. System Conversion, documentation, training, and support-
    system conversion: switching from old to new (parallel, direct, phased, pilot/single location)
    documentation: user guides, etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Types of software tests (3)

A
  1. developmental: tests modules
  2. Alpha: overall system
  3. Beta: capabilities of user end
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Types of Systems Maintenance (4)

A
  1. Corrective: repairing flaws
  2. Adaptive: evolve functionality
  3. Perfective: improving (adding bells and whistles)
  4. Preventative: reduces chance of system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Patch-management system:

A

use the Internet to check for updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

prototyping

A

trial-and-error development (alternative to SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

end-user development

A

non-professional (alternative to SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

2 options for out-of-house IS acquisition

A
  1. external acquisition: purchasing an IS
    - SaaS (Software as a Service) also an option
  2. outsourcing systems development
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

systems benchmark

A

tests for a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

software licensing types

A
  1. shrink-wrap/ click-wrap: generic

2. enterprise/volume: negotiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

software asset management

A

helpful for firms with several software licenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

the management of an outsourcing alliance is super important

A

the management of an outsourcing alliance is super important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Primary threats to IS

A

natural disasters, accidents, employees and consultants, links to outside business contacts, outsiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

computer crime

A

using a computer to commit an illegal act

-has declined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

2 main federal laws against computer crime

A

computer fraud and abuse act, electronic communications privacy act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

hackers

A

individuals who are knowledgeable enough to gain access to computer systems without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

crackers

A

those who break into computer systems with the intention of doing damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

hacktivists

A

those who break into systems/deface websites to promote political or ideological goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

4 groups of computer crimals

A
  1. current or former employees
  2. people committing crimes for personal gain
  3. career criminals using computers to assist them in crimes
  4. outside crackers hoping to find valuable info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

information modification

A

ex. employee breaks into system and gives herself a raise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

malware

A

malicious software: viruses, worms, Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

virus

A

destructive program that disrupts the normal functioning of software. Can reproduce and spread through downloads/email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

worm

A

variation of a virus that is targeted at networks and takes advantage of security holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

trojan horse

A

does not replicate, but causes damage. Codes are hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

logic bombs/time bombs

A

variations of trojan horses. Time bombs: set off by specific dates. Logic bombs: set off by certain types of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

denial of service attack

A

attackers prevent legit users from accessing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

zombie computers

A

created by viruses or worms. Used to attack web sits and make their servers crash because of the increased load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

spyware

A

hidden within freeware or shareware or web sites. gathers info about user. eats up computer’s memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

adware

A

free software paid by advertisements, collects info for banner ad custimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

spam

A

electronic junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

spim

A

spam in text message form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

phishing (spoofing)

A

attempts to trick users into giving away credit card numbers. Duplicates of legit web sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

CAPTCHA

A

Completely Automated Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

cookies

A

messages passed to a Web browser from a Web server. Stored in text file, used for web site customization, may contain sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

botnet

A

a collection of zombie computers connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

bot herder

A

botnet manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

identity theft

A

fastest growing information crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

internet hoaxes

A

false messages circulated online about new viruses that don’t exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

cybersquatting

A

registering a domain name and later reselling it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Anti-Cybersquatting Protection Act

A

prevents cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

cyber harrassment

A

crime that broadly refers to the use of a computer to harrass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

cyber stalking

A

repeated cyber harrassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

cyber bullying

A

the deliberate cause of emotional distress to a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

legally sharing software

A

making one backup for personal use, sharing free software

75
Q

software piracy

A

making copies of purchased software for others, offering stolen proprietary software (warez peddling)

76
Q

patents

A

process or machine inventions

77
Q

copyrights

A

creations of the mind

78
Q

cyberwar

A

military’s attempt to disrupt of destroy another country’s information and communication systems (weapon IS, propaganda)

79
Q

patriot hackers

A

independent citizens that attack perceived enemies of the state

80
Q

cyberterrorism

A

individuals/ groups, govnt not involved. Goal is to cause fear, panic, destruction.

81
Q

Obstacles to cyberterrorism

A
  1. computer systems are complex and attacks may not have desired outcome.
  2. Security measures are fast-changing.
  3. cyberattacks rarely cause physical harm
82
Q

likely hood of large cyberattacks is small because a successful large attack would require

A

intelligence info, years of prep, and at least $200 million

83
Q

which IS are at risk?

A

All that are connected to a network

84
Q

IS security

A

precautions to keep IS safe from unauthorized access and use

85
Q

IS audits- 3 approaches

A

risk reduction (protect), risk acceptance (absorb), risk transfer (get insurance)

86
Q

IS risk analysis

A

assess value, determine likelihood of compromise, compare costs (costs of loss vs costs of protection)

87
Q

technological safeguards

A

physical access restrictions, firewalls, encryption, virus monitoring and prevention, audit-control software, dedicated facilities

88
Q

physical access restrictions

A

require authentication: passwords, keys, biometrics

89
Q

biometrics

A

unique physical attributes

90
Q

Access-control software

A

restricted use for certain people within a system, access only to files required for work

91
Q

wireless LAN control

A

preventing unauthorized use

92
Q

virtual private network (VPN)

A

tunneling: encrypted info, sends private info over public network

93
Q

firewall

A

detects intrusion and prevents unauthorized access

94
Q

encryption

A

encoding/decoding

95
Q

cryptography

A

the science of encryption

96
Q

certification authority

A

manages the distribution of keys on a busy website (middleman)

97
Q

Secure Sockets Layer (SSL)

A

popular public key encryption method

98
Q

audit-control software

A

keeps track of computer activity and spots suspicious actions

99
Q

audit trail

A

record of users and activities

100
Q

secure data centers

A

important. need power and cooling abilities

101
Q

high-availabilty facilities

A

ensure uninterrupted service, self-sufficient. Backup cooling systems, raised floors, built to withstand storms

102
Q

collocation facilities

A

places to rent space for servers

103
Q

backups

A

need to backup to secondary storage devices and regular intervals

104
Q

cold backup site

A

has space needed in case of emergency

105
Q

hot backup site

A

duplicated office

106
Q

redundant data centers

A

centers at different geographic areas

107
Q

closed-circuit tvs

A

monitor for physical intruders

108
Q

Uninterruptible power supply (UPS)

A

protection against power surges

109
Q

computer forensics

A

use of formal investigation techniques to evaluate digital info

110
Q

honeypots

A

fake sites used to entice and catch hackers

111
Q

non-technical safeguards

A

management of people’s use of IS

112
Q

Developing an IS Security Plan (5 steps)

A
  1. Risk Analysis
  2. Policies and Procedures- actions to be taken if security is breached
  3. Implementation
  4. Training
  5. Auditing
113
Q

Information policy

A

handling of sensitive info

114
Q

Security policy

A

technical controls on organizational computers

115
Q

use policy

A

appropriate use of in-house IS

116
Q

account management policy

A

procedures for adding new users and removing user accounts

117
Q

incident handling procedures

A

handling security breach

118
Q

disaster recovery plan

A

restoration of computer operations

  • recovery time objectives (max time allowed to recover)
  • recovery point objectives (how current should the backup material be?)
119
Q

business continuity plan

A

describes how a business resumes operation after a disaster

120
Q

responding to security breach

A

restore lost data, perform new risk audit, implement additional safeguards, contact law enforcement

121
Q

IS controls

A

specific IT processes designed to ensure reliability of info

122
Q

3 types of IS control

A

preventative, detective, corrective

123
Q

policies

A

define aim and objectives

124
Q

standards

A

support the requirements of policies

125
Q

organization and management

A

define the lines of reporting

126
Q

physical and environmental controls

A

protect the organizations IS assets

127
Q

systems software controls

A

enable applications and users to utilize the systems

128
Q

systems development and acquisition controls

A

ensure systems meet the organization’s needs

129
Q

application-based controls

A

ensures correct input, processing, storage, and output of data, maintains records

130
Q

IS audit

A

performed externally to help organizations assess the state of their IS controls

131
Q

input devices

A

enter info into a computer

132
Q

processing devices

A

transform inputs into outputs

133
Q

output devices

A

deliver info to users in a usable format

134
Q

keyboards

A

QWERTY, traditional, RF/Bluetooth, ergonomic, virtual

135
Q

to enter batch data

A

scanners: text recognition software, optical character recognition (docs to text), bar code readers, etc.

136
Q

audio/video input

A

needs to be digitized

137
Q

binary codes

A

base-2. bits make up bytes

138
Q

system unit

A

houses the computers motherboard, power supply, fan, memory, CPU, hard drive, slots

139
Q

motherboard

A

connects all the components that do the processing work

140
Q

primary storage

A

temporary storage of the data currently in use: RAM, registers, Cache memory, ROM

141
Q

RAM

A

random access memory- main memory, primary

142
Q

registers

A

in CPU, where data temporarily resides while it is being processed, primary

143
Q

Cache memory

A

storage for most recently or most frequently used data, primary

  • internal cache: in CPU
  • external cache: close to CPU
144
Q

ROM

A

read-only memory: stores programs and instructions that are automatically loaded while the computer is turned on, primary

145
Q

Secondary storage

A

much slower than primary: hard drives, tape drives

146
Q

hard drives

A

several magnetic disks w/ high storage capacity

147
Q

tape drives

A

used for longer term archival storage

148
Q

head crash

A

when read/write head touches hard drive disk

149
Q

removable storage

A

outside of computer: flash memory, optical disks, magnetic tape

150
Q

optical disks

A

binary data stored as pits in flat surfaces

  • CD-ROMS: compact read-only memory
  • CD-R: compact disk, readable
  • CD-RW: compact disk, rewritable
  • DVD
  • blueray
151
Q

Magnetic tape

A

capacity expressed in density (characters or bytes per inch)

152
Q

hardware interfaces (ports)

A

plugs and sockets- for connecting devices to computers

153
Q

serial ports

A

modem, mouse, keyboard

used to transfer 1 bit at a time

154
Q

parallel ports

A

printer, transfers several bits concurrently. Much faster

155
Q

cathode ray tube

A

older computer and tv displays

156
Q

liquid crystal display

A

newer, lighter, thinner

157
Q

organic light-emitting diodes

A

even lighter

158
Q

video output

A

cathode ray tubes, liquid crystal display, organic light-emitting diode, projector, electronic paper

159
Q

common tasks of os (operating systems)

A

booting, reading programs, managing files, maintaining structures, formatting disks.

160
Q

application software

A

created for a specific purpose, usually to increase productivity

161
Q

popular programming languages

A

BASIC, HTML, Java, .NET

162
Q

fourth-generation languages

A

outcome-oriented language. ex: SQL for querying a database

163
Q

visual languages

A

designed for programming applications via a graphical user interface (GUI) (Visual basic)

164
Q

Hypertext Markup Language (HTML)

A

specifies format of Web pages, uses tags

165
Q

Java

A

used for dynamic content, has applets

166
Q

applets

A

small programs embedded in Web pages

167
Q

Microsoft.NET

A

can be used on a variety of platforms and services (family of languages)

168
Q

Computer-aided software engineering (CASE)

A

used to design and implement systems. Automates activities, increases productivity, improves quality.

169
Q
  1. Centralized computing
A

Mainframe era: terminals were local input/output devices used to enter data to the mainframe

  • dumb terminals: no processing activities
  • smart terminals
  • not a true network because there is no sharing of data/capabilities
170
Q
  1. distributed computing
A

gave individuals control over their own computing. Introduction of PCs. Several small computers could do the same thing as 1 large computer

171
Q
  1. Collaborative computing
A

synergistic form of distributed computing. 2 or more computers working on a common processing task. Not just communicating data, but sharing processing capabilities.

172
Q

Private Branch Exchange

A

telephone network serving a particular location. Connects phones and computers. Lmtd bandwidth because it uses ordinary telephone lines. Business must purchase/lease equipment.

173
Q

Local Area Network

A

spans small area. Most widely used type of network. Computers share info. Usually one type of cable used. WIreless is an option.

174
Q

Campus Area Network

A

Spans multiple buildings. Connects LANs

175
Q

Wide Area Network

A

spans large area. connects LANs. Different hardware. Used by multinationals. Info transmitted across countries.
4 different types:
1. Metropolitan Area Networks
2. Enterprise Networks
3. Value-added networks (managed by 3rd parties)
4. Global networks

176
Q

Personal Area Networks

A

exchange data between computing devices. Short-range radio communication. Uses Bluetooth.

177
Q

modems

A

enable transmission of data over telephone lines.

modulator: digital to analog.
demodulato: analog to digital

178
Q

database design

A

must not have inaccurate or redundant data. entities have attributes

179
Q

primary key

A

unique identifier for identifying records

180
Q

combination primary key

A

combination of two or more attributes as a primary key

181
Q

secondary key

A

identifies records that share a common value. Attribute not used as a primary key.

182
Q

relational database

A

best database, most widely used. used to relate information between tables. Associations connect tables.

183
Q

normalization

A

eliminate redundancy