Complete Flashcards

(55 cards)

1
Q

Dimensions of Information Systems

A
  • Organization
  • Management
  • Information Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems = Information Technology ?

A

No. Information Technology is a sub-set of IS. IS = set of components ; IT= hardware & Software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of social software in corporations

A
  1. Social business software
  2. Enterprise Social Network
    3 Collaboration Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications of Social Business

A
Social networking
Crowd sourcing
Shared workspace
Blogs and wikis
Social commerce
File sharing
Social marketing
Communities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is an internal company website that is accessible only by employees.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is a company website that is opened to authorized vendoors and auppliers, and are often used to coordinate the movement of supplies to the firms’s production apparatus.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mention the types of Information Systems

A
  • Transaction Processing Systems
  • Executive Support Systems
  • Management Information Systems
  • Decision Support Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ performs and record the daily routine transactions necessary to conduct the business

A

Transaction Process System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_________ provides reports on organization’s performance to help middle management monitor and control business

A

Management Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ combines data and sophisticated analytical models pr data analysis tools to support semi structured and unstructured decision making

A

Decision Support System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ helps senior management address non-routine decisions requiring judgment, evaluation and insight because there’s no agreed-on procedure for arriving at a solution.

A

Executive support system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Enterprise Applications

A

Customer Relations Management
Supply Chain Management
Enterprise resource planning
Knowledge Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Activities kost directly related to the production and distribution of the firm’s products and services, which create value for the customer.

A

Primary Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ make the delivery of the primary activities possible

A

Support Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which ones are primary acrivities: 
Administration and management
Inbound logistics
Operations
HR
Sales and marketing
Service
Technology
Procurement
Outbound logistics
A
Inbound logistics
Outbound logistics
Sales and Marketing
Operations
Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Strategies for dealing with competitive forces

A
  1. Low cost leadership
  2. Product differentiation
    3 Focus on market niche
  3. Customer and supplier intimacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___________ are tiny software programs invisibly embedded in email messages and web pages that are designed to monitor the behavior of the user visiting a web site or sending an email

A

web beacons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_________ are tiny files deposited in a computer’s hard drive when a certain individual visits a certain website. They are used to identify the visitor and track visits to the website

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ technology that aids in gathering information about a person or organization without their knowledge.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

5 step ethical analysis process

A
  1. Identify and describe facts clearly
  2. Define the conflict or dilemma and identify the higher order values involved
  3. Identify the stakeholders
  4. Identify your options
  5. Identify the potential consequences of your options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__________ is a set of physical devices and software applications that are required to operate the entire enterprise.

A

IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Evolution of IT infrastructure

A
  1. Main frame/ mini computer era
  2. Personal computer era
  3. Client/server era
  4. Enterprise computing
  5. Cloud computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud infrastructure….?

A

Customers use processing, storage networking and other computing resources from cloud service providers to run their information systems

24
Q

Cloud platform

A

Custimees use infrastructure and programming tools supported by the cloud service provider to develop their own applications

25
Cloud software
Customers use software hosted by the vendor on the vendor's cloud infrastructure and deliver over network
26
Determine acceptable levels of computer response time and availability for the firm's mission/critical systems
Capacity planning
27
Ability of a computer, product or system to expand to serve a large number of users without crashing down
Scalability
28
TCO is....
The original cost of acquiring and installing hardware and software + ongoing administration costs
29
____________ collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data
Customer database
30
Business Intelligence?
Using data analysis tools and applications to help business make more informed decisions. Is the transformation on raw data into a meaningful form that can be used for business purposes
31
Hadoop
Enables distributed parallel processing of big data across inexpensive computers
32
OLAP
Supports multidimensional data analysis
33
Data mining
Finds hidden patterns, infers rules to predict future behavior. Associations, sequences, classifications, clustering and forecasting
34
Web 2.0
Interactive Internet based services that enable people to collaborate, share information and create new services online, including mashups, blogs, RsS and wikis
35
Software program attached to other programs/files in order to be executed. Spread from computer to computer with human actions
Virus
36
Independent computer programs that copy themselves from one computer to the other, not requiring human intervention
Worms
37
Software program that appears to be benign but does something unexpected.
Trojan horse
38
Taking advantage of vulnerabilities in poorly coded web applications software to introduce malware into a company's systems and networks
SQL Injection attacks
39
Spyware
Install themselves on a computer to monitor user web surfing activity and serve up advertising
40
Maskerading someone; redirecting a customer to fake websites to collect information
Spoofing
41
Eavesdropping; allows to steal iformation
Sniffing
42
Internet vulnerabilities have also turned individuals and even entire nation states into easy targets for politically motivated hacking to conduct sabotage and espionage
Global threat
43
Solutions to computer crimes
``` Firewalls Securing wireless networks Encryption System availability Software quality Business policies ```
44
Tracks all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customer satisfaction and customer retention
Customer relations management
45
E-commerce revenue models
``` Advertising Sales revenues Subscription revenues Free/ freemium Transaction fee Affiliate revenue ```
46
Online marketing strategies
``` Create buzz Youtube adds Seo Pay for adds in a website Adworks ```
47
Dimensions of knowledge
Data Information Knowledge Wisdom
48
Tacit knowledge
Expertise and experience of organizational members that has not been formally documented
49
Explicit knowledge
Type of knowledge that has already been documented
50
Knowledge management value chain
``` Data information acquisition Knowledge acquisition Knowledge storage Knowledge dissemination Knowledge application ```
51
Types of knowledge management systems
Enterprise wide systems Knowledge work systems Intelligent techniques
52
Knowledge work systems
Specialized systems built for knowledge workers encharge of discovering and creating new knowledge for a company
53
Intelligent techniques
Tools for discovering patters and applying knowledge yo discrete decisions and knowledge domains
54
Expert systems
Knowledge intensive computer program used to capture tacit knowledge in a very specific and limited domain of human expertise Capture the knowledge of skilled employees in the form of a set of rules in a se system that can be used by others in the organization. Deals with classification problems
55
Neural networks
Used fir solving complex, poorly understood problems for which large amounts of data have been collected. Bt used ti capture tacit knowledge Programmed to learn patterns from large quantities of data by shifting through data, searching for relationships, building models and correcting over and over again the model's mistakes