Bus220 - Week 3 Flashcards

Week 3 Material (88 cards)

1
Q

Wireless devices

A

Wireless Application Protocol (WAP)
Microbrowsers
Wireless transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Capabilities of Wireless Devices

A
Cellular telephony
 E-mail access
Bluetooth
 Short message service
Wi-Fi
 Instant messaging
Digital camera
 Text messaging
Global positioning system
 MP2 music player
Organizer
 Video player
Scheduler
 Address book
Internet access
QWERTY keyboard
Calculator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Transmission Media

A
Microwave Transmission
Satellite transmission
–Geostationary Orbit (GEO)
–Middle Earth Orbit (MEO)
–Low Earth Orbit (LEO)
–Global Positioning System (GPS)
–Internet Over Satellite (IOS)
--Radio
--Satellite Radio
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Computer Networks and Internet Access

A

Short range wireless networks
Medium range wireless networks
Wide area wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short Range Wireless Networks

A

Bluetooth
Ultra-wideband
Near-field Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the various types of transmission media.

A

Microwave, satellite and infrared are line of sight methods while radio signals travel through the air and can pass through walls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe today’s wireless devices.

A

Pagers – one way wireless devices
–PDA – personal digital assistant, a small handheld wireless device
–GPS – global positioning system, a satellite-based tracking system that enables the determination of a GPS device’s location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ultra-Wideband (UWB)

A

Ultra-wideband has many uses as you can see at the TimeDomain Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Near-Field Communications in action

A

The Ultra Radio will be a small, light, battery-operated device that would be integrated with the firefighter’s uniform. It is projected to have a useable range of 100 to 200 meters and operate in the demanding environment faced by firefighters; extremely high temperatures, heavy smoke and wet conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Medium Range Wireless Networks

A
Wireless fidelity (Wi-Fi)
Wireless access point
Hotspot
Wireless network interface card
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wide-Area Wireless Networks

A
Cellular Radio
–1st Generation
–2nd Generation
–2.5 Generation
–3rd Generation
–4th Generation
Wireless Broadband or WiMax
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Bluetooth?

A

Bluetooth is a device used to create small wireless radio-based personal networks for up to 8 devices within 10 meters on low power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a WLAN?

A

Wireless local area networks are local area networks without the cables used to transmit and receive data via radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Fidelity – known as Wi-Fi

A

802.11a transmits up to 54 Mbps within 20-30 meters
–802.11b transmits up to 11Mbps within 30-50 meters
–802.11g transmits up to 54 Mbps and is compatible with 802.11b
–Major benefits are low cost and ability to provide simple Internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cellular services

A

–Communicate with radio antenna placed within adjacent areas called cells.
–Uses digital signals and can transmit voice and data up to 384 Kbps when device is use while walking, 128 Kbps while in a car and up to 2Mbps when in a fixed location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WiMax

A

–Worldwide interoperability for microwave access has a range of up to 31 miles compared with 300 feet for Wi-Fi and 30 feet for Bluetooth.
–Transfer rate of 75 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mobile computing

A
Mobility
– Broad reach
The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time:
–Ubiquity
–Convenience
–Instant connectivity
–Personalization
–Localization of products and services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mobile Commerce

A

The development of m-commerce is driven by the following factors:
–Widespread availability of mobile devices
–No need for a PC
–The “Cell phone culture”
–Declining prices
–Bandwidth improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Intrabusiness Applications

A

Accessing Information
–Mobile Portal
–Voice Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Location-Based Applications

A

Shopping from Wireless Devices
Location-based Advertising
Location-based Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Telemetry Applications

A

Identify maintenance problems in equipment;
 Monitor patients and control medical equipment from a distance;
Remote vehicle diagnosis and preventive maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the major drivers of mobile computing?

A
Widespread availability of mobile devices
–No need for a PC
–The “Cell Phone Culture”
–Declining prices
–Bandwidth improvement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mobile portals

A

–A customer interaction channel that aggregates content and services for mobile users.
–Services include news, sports, e-mail, entertainment, travel information, restaurant and event information, games, TV and movie listings, community services and stock trading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Voice portals

A

A Web site with an audio interface
–Not a Web site in the normal sense, but rather phone numbers which connect to a Web site where you can request information verbally.
–System finds the information and then translates it into a computer generated voice reply.
–An example is 511, the travel-information line developed by Tellme.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Wireless financial services
Provide a convenient way to transact business regardless of where you are or what time it is –Services include banking, wireless payments and micropayments, wireless wallets, bill-payment services, brokerage services, and money transfers
26
Major intra-business wireless applications
Applications that help owners of rental vehicles, commercial transport and heavy equipment fleets •Determine location of vehicles •Control messages sent to and from vehicles –Insurance companies use wireless digital cameras to take pictures at accident scenes and transmit to processing centers –Mystery customers who file reports after evaluating locations of a national restaurant franchises use hand-held devices to file reports
27
Pervasive Computing
Radio frequency identification (RFID) | Wireless sensor networks (WSNs)
28
Define pervasive computing
Pervasive computing is invisible “everywhere computing” that is embedded in the objects around us, including the floor, lights cars, the washing machine, cell phones, our clothes, etc.
29
Define RFID
–RFID is the technology which allows manufacturers to attach tags with antennae and computer chips on goods and then track their movement through radio signals. –Developed to replace bar codes
30
Define wireless sensor networks.
–Networks of interconnected, battery-powered, wireless sensors called motes that are place into the physical environment. –Each mote contains processing, storage and radio frequency sensors and antennae –Enables more accurate information to be gathered
31
RFID
–Technology based on electrical energy
32
RuBee
Works better in harsh environments near metal and water in the presence of electromagnetic noise
33
Transaction Processing Systems (TPS)
Batch Processing Online Transaction Processing (OLTP) –Capture, storage and monitoring of data generated from all business transactions –Data is input to the organization’s database –Must handle high volumes, avoid errors and provide highly secure and stable environment
34
Objectives of a TPS
``` –Handle large volumes of data –Avoid errors –Handle large variations in volume (peak times) –Avoid downtime –Never lost results –Maintain privacy and security ```
35
Functional Area Information Systems
``` are designed to support a functional area by increasing its internal effectiveness and efficiency in the following areas: –Accounting –Finance –Marketing –Operations (POM) –Human Resources Management ```
36
Exception Report
Exception reports include only information that falls outside certain threshold standards. To implement management by exception, management first creates performance standards. The company then sets up systems to monitor performance (via the incoming data about business transactions such as expenditures), compare actual performance to the standards, and identify predefined exceptions. Managers are alerted to the exceptions via exception reports.
37
Summary Report
A summary report is one type of routine report
38
Detailed Report
A detailed report is another type of routine report
39
Drill-Down Report
Drill-down report is a type of ad-hoc report -show a greater level of detail. For example, a manager might examine sales by region and decide to “drill down to more detail” to look at sales by store and then sales by salesperson.
40
Key-Indicator Report
Key-indicator report is a type of ad-hoc report - summarize the performance of critical activities. For example, a chief financial officer might want to monitor cash flow and cash on hand
41
Comparative Report
Comparative report is one type of ad-hoc report. - compare, for example, performances of different business units or during different time periods.
42
What is a functional area information system?
–A system in which the functionality supports one particular area or department such as HR systems, accounting systems, marketing systems and production systems. –Typically developed independent of each other resulting in “information silos” –Designed to increase internal effectiveness and efficiency
43
How do information systems benefit the finance and accounting functional area?
–Achieves automation of accounting and finance activities: •Manage how money flows into, within and out of organizations •Analyzing operational data to help forecast and project business activities and budgeting to support them. •Define amount of money needed to finance operations and how that money can be raised from the financial markets and at what costs
44
How do information systems benefit the production and operations management (POM) functional area?
–Achieves automation of POM activities: •In-house logistics and materials management •Planning production and operation, computer-integrated manufacturing (CIM) and product life cycle management (PLM) •Supply chain management •Etc.
45
What are the most important HRIS applications?
``` –Personal administration •Workforce planning •Employee recruitment •Assignment tracing •Personnel planning and development •Performance management and reviews –Time accounting –Payroll compensation –Benefits accounting –Regulatory requirements ```
46
How does an FAIS support management by exception?
Establish criteria ranges and produce reports containing data necessary for some action
47
How does an FAIS support on-demand reports?
Flexible interactive reporting capabilities allow managers to query by timeframes, departments, product lines or other criteria
48
Enterprise Resource Planning Systems (ERP)
The major objective of ERP systems: integrate the functional areas of the organization by enabling seamless information flows across them.
49
business process
A business process is a set of related steps or procedures designed to produce a specific outcome.
50
ERP
Enterprise resource planning –Created to control all major business processes with a single software architecture in real time –Integrates all department and functional information flows across a company into a single system that can serve the needs of the enterprise
51
ERP II
Inter-organizational ERP systems that provide Web-enabled links between a company’s key business systems and it’s customers, suppliers, distributors and others
52
Core ERP modules
–Financial management –Operations management –HR management
53
Extended ERP modules
–Customer relationship management (CRM) –Supply chain management –Business intelligence –E-business
54
Drawbacks of ERP software
–Extremely complex, expensive and time consuming to implement –May need to change existing business processes to fit the software –Companies must purchase the entire software package even if they only want to use a few of the modules
55
Why is it logical to organize IT applications by functional areas?
Data is collected and flows through an organization based on functions of various departments. IT systems that mirror those functions in departments support a smooth operation. 
56
Describe the role of a TPS in a service organization.
–Customer orders/requests are entered into the TPS and are then available for the department which will handle the order. Data is passed to other systems such as CRM, DSS, knowledge management and e-commerce as needed.
57
Describe the relationship between TPS and FAIS.
FAIS provides information primarily to lower- and middle-level managers in the various functional areas. –Managers use this information to help plan, organize, and control operations. –The information is provided in a variety of reports. –The reports need to be based on data, and that is the role of the TPS to generate the data from the business operations.
58
Discuss how IT facilitates the budgeting process.
The budget allows management to distribute resources in the way that best supports the organization’s mission and goals. –Budgeting software supports budget preparation and control and facilitates communication, review and approval among participants in the budget process. –These packages can reduce the time involved in the budget process. –Further, they can automatically monitor exceptions for patterns and trends as well.
59
How can the Internet support investment decisions?
The internet is a massive repository of company and financial information. –There are several web sites that provide financial information and these can be used by an investor to make investment decisions.
60
Describe the benefits of integrated accounting software packages.
–Integrated accounting packages allow the automation of several business processes – expense management, investment management, control and auditing, managing multiple currencies, and virtual close. –By integrating accounting with financial management, many vendors have allowed this automation to be supported.
61
Discuss the role that IT plays in support of auditing.
–One major reason that organizations go out of business is their inability to forecast and/or secure a sufficient cash flow. –Underestimating expenses, overspending, engaging in fraud, and mismanaging financial statements can lead to disaster. –Consequently, it is essential that organizations effectively control their finances and financial statements. –Auditing has two basic purposes: (1)to monitor how the organization’s monies are being spent, an (2)to assess the organization’s financial health. –Internal auditing is performed by the organization’s accounting/finance personnel. These employees also prepare for periodic external audits by outside CPA firms.
62
Investigate the role of the Web in human resources management.
Many HRIS applications are delivered via an HR portal. Key HR functions are: recruitment, HR maintenance and development, and HR planning and management. –Recruitment involves finding potential employees, evaluating them, and deciding which ones to hire. –Companies are trying to find appropriate candidates on the Web, usually with the help of specialized search engines. –Companies also advertise hundreds of thousands of jobs on the Web. –Online recruiting can reach more candidates, which may bring in better applicants. –The costs of online recruitment are usually lower than traditional recruiting methods such as advertising in newspapers or in trade journals. –After employees are recruited, they become part of the corporate human resources pool, which means they must be evaluated, maintained, and developed. –IT provides support for these activities. –IT also plays an important role in training and retraining. –Some of the most innovative developments are taking place in the areas of intelligent, computer-aided instruction and the application of multimedia support for instructional activities. •For example, much corporate training is delivered over the company’s intranet or via the Web. – IT can also provide support for payroll and employees’ records, benefits administration as well.
63
What is the relationship between information silos and enterprise resource planning?
ERP allows for integration of business operations and can break silos by sharing data from different parts of the business and integrating business processes.
64
The Manager’s Job and Decision | Making
Managers have three basic roles (Mintzberg 1973): – Interpersonal roles – Informational roles – Decisional roles
65
Why Managers Need IT Support
The number of alternatives to be considered constantly increases. Decisions must be made under time pressure. Decisions are more complex. Decision makers can be in different locations and so is the information. BIS/
66
Problem Structure
The first dimension deals with the problem structure, where does the decision making processes fall along the continuum ranging from highly structured to highly unstructured decisions. Structured Unstructured Semistructured
67
The Nature of Decisions
The second dimension of decision support deals with the nature of decisions Operational control Management control Strategic planning
68
Two types of BI Systems:
–Those that provide data analysis tools •Multidimensional data analysis (or online analytical processing) •Data mining •Decision support systems –Those that provide information in structured format •Digital dashboards
69
Multidimensional Data Analysis
Provides users with a look at what is happening or what has happened. Allows users to analyze data in such a way that they can quickly answer business questions.
70
Data Mining
Data mining performs two basic operations: –Predicting trends and behaviors –Identifying previously unknown patterns and relationships
71
Decision Support Systems (DSS)
``` Decision support systems DSS capabilities –Sensitivity analysis –What-if analysis –Goal-seeking analysis ```
72
Group Decision Support Systems (GDSS)
Organizational Decision Support System (ODSS) is a DSS that focuses on an organizational task or activity involving a sequence of operations and decision makers.
73
Digital Dashboards:
–Provide rapid access to timely information. –Provide direct access to management reports. –Are very user friendly and supported by graphics.
74
The Power of Visualization
Even though a picture is “worth a thousand words,” we have to be very careful about just what we are seeing. –Remember, on the Internet, it is “user beware!”
75
GISMO
GISMO is a geographic information system developed for the city of Corvallis, Oregon.
76
Expert Systems
``` The transfer of expertise from an expert to a computer and then to a user involves four activities: –Knowledge acquisition –Knowledge representation –Knowledge inferencing –Knowledge transfer ```
77
The Components of Expert Systems
``` Knowledge base Inference engine User interface Blackboard Explanation subsystem ```
78
Natural Language Processing & Voice Technologies
Natural language processing (NLP) Natural language understanding / speech (voice) recognition Natural language generation/voice synthesis
79
Wireless Security - Four major threats
Rogue access point War driving Eavesdropping RF (Radio frequency) jamming
80
Behavioral Actions
-Do not provide personal information to strangers in any format. -Protect your social security number. -Use credit cards with your picture on them. -Use virtual credit cards. -Know your credit card billing cycles. -Limit use of debit cards. -Do not use a personal mailbox at home or at an apartment. -Use a cross-cut (confetti) shredder. -Sign up with a company that provides -proactive protection of your personal information. -Never download files or software that you have not requested. -Test your system. -Run free malware scans on your computer. -Have an anti-malware product on your computer and use it (ideally at least once per week). --Have a firewall on your computer. -Have proactive intrusion detection and prevention software on your computer. -Manage patches. -Use a browser other than Internet Explorer. -Travel with a “sterile” laptop or no laptop. -Use two-factor authentication. -Use encryption.
81
Wireless Security
-Hide your Service Set Identifier (SSID). -Use encryption. -Filter out media access control (MAC) addresses. -Limit Internet Protocol (IP) addresses. -Sniff out intruders. -Change the default administrator password on your wireless router to something not easily guessed. -Use virtual private networking (VPN) technology to connect to your organization’s network. -Use Remote Desktop to connect to a computer that is running at your home. -Configure windows firewall to be “on with no exceptions.” -Only use Web sites that use Secure Sockets Layer (SSL) for any financial or personal -transactions (discussed in Chapter 3). -Use wireless security programs.
82
wireless local area network (WLAN)
A computer network in a limited geographical area that uses wireless transmission for communication.
83
wireless network interface card (NIC)
A device that has a built-in radio and antenna and is essential to enable a computer to have wireless communication capabilities.
84
wireless sensor networks (WSN)
Networks of interconnected, battery-powered, wireless sensors placed in the physical environment.
85
Discuss the four major threats to wireless networks.
The four major threats to wireless networks are rogue access points, war driving, eavesdropping, and radio-frequency jamming. A rogue access point is an unauthorized access point to a wireless network. War driving is the act of locating WLANs while driving around a city or elsewhere. Eavesdropping refers to efforts by unauthorized users to access data that are traveling over wireless networks. Radio-frequency jamming occurs when a person or a device intentionally or unintentionally interferes with wireless network transmissions.
86
A system of programs and data structures that approximates the operation of the human brain
What is nuerosystem
86
Discuss the major m-commerce applications.
Mobile financial applications include banking, wireless payments and micropayments, wireless wallets, and bill payment services. Job dispatch is a major intrabusiness application. Voice portals and mobile portals provide access to information. Location-based applications include retail shopping, advertising, and customer service. Other major m-commerce applications include wireless telemedicine and telemetry.
87
these use multiple wifi access points to create a wide area network that can be quite large
what is a mesh network