Exam 2 Flashcards

(204 cards)

1
Q

MIS Infrastructure

A

Includes the
plans for how a firm will build, deploy,
use, and share its data, processes,
and MIS assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of MIS Infrastructure

A
  • hardware
  • software
  • network
  • client
  • server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information MIS Infra

A

Supports Operations
- backup, disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backup

A

an exact cope of a system’s information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery

A

the ability to get a system up and running in the event of a system crash or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of recovery

A
  • fault tolerance
  • failover
  • failback
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agile MIS Infra

A

supports change
- accessibility, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sustainable MIS Infra

A

supports the environment
- cloud computing, visualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

disaster recovery plan

A

a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disaster recovery cost curve

A

1) Chart the cost to the organization of the unavailability of information and technology
2) the cost to the organization of recovering from a disaster over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the disaster recover plan in terms of cost and time occurs when…

A
  • the cost to your organization of the unavailability of information and technology crosses the cost to your organization to recover from a disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hot site

A

a separate and fully equipped facility where the company can move immediately after a disaster and resume business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cold site

A

a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

warm site

A

a separate facility with computer equipment that requires installation and configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business continuity planning (BCP)

A

a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

emergency

A

a sudden unexpected event requiring immediate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

emergency prepardness

A

ensures a company is ready to respond to an emergency in an organized, timely and effective manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

4 parts of Business continuity plan

A
  • disaster recovery plan
  • technology recovery strategies
  • business impact analysis
  • emergency notification services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Technology Recovery Strategies

A
  • Hardware
  • Software
  • Networking
  • Data Center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Technology Recovery Strategies: HARDWARE

A

applications such as email, payroll and instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Technology Recovery Strategies SOFTWARE

A

servers, computers, wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Technology Recovery Strategies: NETWORKING

A

wireless, LAN, fiber, cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Technology Recovery Strategies: DATA CENTER

A

climate control, power supply, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

business impact analysis

A

identifies all critical business functions and the effect that a specific disaster may have upon them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
technology failure
occurs when the ability of a company to operate is impaired because of a hardware, software or data outage
26
incident
unplanned interruption of a service
27
incident management
the process responsible for managing how incidents are identified and corrected
28
Characteristics of an agile MIS infrastructure
- Accessibility. * Availability. * Maintainability. * Portability. * Reliability. * Scalability. * Usability.
29
accessibility
refers to the varying levels that define what a user can access, view or perform when operating a system
30
web accessibility
allows people with disabilities to use the Web
31
administrator access
unrestricted access to the entire system
32
availability
time frames when the system is operational
33
unavailable
time frame when a system is not operating and cannot be used
34
high availability
system is continuously operational at all times
35
maintainability
how quickly a system can transform to support environmental changes
36
what must organizations do when designing and building systems today?
watch today's business as well as tomorrows
37
What should systems be to meet all types of business changes
flexible
38
portability
the ability of an application to operate on different devices or software platforms - applications want to operate on as many devices as possible
39
reliability
ensures a system is functioning correctly and providing accurate information
40
Reliability is another term for...
accuracy when discussing the correctness of systems within the context of efficiency IT metrics
41
Vulnerability
a system weakness that can be exploited by a threat
42
scalability
how well a system can scale up, or adapt to the increased demands of growth
43
performance
measures how quickly a system performs a process or transaction
44
capacity planning
determine future environmental infrastructure requirements to ensure high-quality system performance
45
usability
the degree to which a system is easy to learn and efficient and satisfying to use
46
serviceability
how quickly a third-party can change a system to ensure it meets their needs and the terms of any contracts including agreed levels of reliability, maintainability or availability
47
Moore's Law
Refers to the computer chip performance per dollar doubles every 18 months.
48
Sustainable or "green" MIS
Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment.
49
corporate social responsibility
Companies’ acknowledged responsibility to society
50
Three Primary Side Effects Of Businesses’ Expanded Use Of Technology
- Increased Electronic Waste - Increased Energy Consumption - Increased Carbon Emissions
51
E-waste
refers to discarded, obsolete or broken electronic devices
52
Sustainable MIS disposal
refers to the safe disposal of MIS assets at the end of their life cycle
53
Energy consumption
the amount of energy consumed by business processes and systems.
54
a huge increase in technology uses causes
amplified energy consumption
55
The energy consumed by a computer is estimated to produce as much as _____ percent of the amount of _____________.
10; carbon dioxide produced by an automobile
56
carbon emissions
carbon dioxide and carbon monoxide produced by business processes and systems
57
How much power can a single desktop computer and monitor consume
at least 100 watts of power per hour
58
Components of a Sustainable MIS Infrastructure: Supporting the Environment
- grid computing - virtualized computing - cloud computing
59
grid computing
a collection of computers, often geographically dispersed that are coordinated to solve a common problem
60
Virtualization
Creates multiple “virtual” machines on a single computing device
61
data center
A facility used to house management information systems and associated components, such as telecommunications and storage systems
62
Sustainable data centers...
* Reduces carbon emissions. * Reduces required floor Space. * Chooses Geographic location.
63
multi-tenancy
The cloud means that a single instance of a system serves multiple customers
64
single-tenancy
Each customer or tenant must purchase and maintain an individual system
65
cloud fabric
The software that makes possible the benefits of cloud computing, such as multi-tenancy
66
on-demand self service
users can increase storage and processing power as needed
67
broad network access
all devices can access data and applications
68
multi-tenancy: cloud computing
customers share pooled computing resources
69
rapid elasticity
storage, network bandwidth, and computing capacity can be increased or decreased immediately, allowing for optimal scalability
70
measured service
clients can monitor and measure transactions and use of resources
71
private cloud
bank, government
72
public cloud
amazon, windows
73
hybrid cloud
private cloud of the company and a public cloud for customers, suppliers and partners
74
community cloud
private hospital
75
abreivations
SAAS: Canvas PAAS: Facebook INFAAS: access to raw computing
76
INFAAS vs, SAAS
the degree in control over the resources you need as an organization
77
data
is everywhere in an organization
78
what do employees do with data?
must be able to obtain and analyze the many different levels, formats, and granularities of organizational data to make decisions
79
collecting data can...
provide tremendous insight into how an organization is performing
80
data levels
individual knowledge, department enterprise
81
data formats
document, presentation, spreadsheet, database
82
granularities
summary; reports for each salesperson, product and/or part
83
4 types of primary traits of the value of data
1. Data type 2. Data timeliness 3. Data quality 4. Data Governance
84
transactional data
Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks
85
analytical data
Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks
86
examples of transactional data
airline ticket, sales receipt, packing slip
87
examples of analytical data
product statistics, sales projections, trends, future growth
88
Real-time data
Immediate, up-to-date data
89
Real-time system
Provides real-time data in response to requests.
90
data inconsistency
Occurs when the same data element has different values
91
data integrity issues
Occur when a system produces incorrect, inconsistent, or duplicate data
92
Characteristics of High Quality-Data
- accurate - complete - consistent -timely -unique
93
The four primary sources of low quality data include....
1. Customers intentionally enter inaccurate data to protect their privacy 2. Different entry standards and formats 3. Operators enter abbreviated or erroneous data by accident or to save time 4. Third party and external data contains inconsistencies, inaccuracies, and errors
94
Potential business effects resulting from low quality data include
- inability to accurately track customers. * Difficulty identifying valuable customers. * Inability to identify selling opportunities. * Marketing to nonexistent customers. * Difficulty tracking revenue. * Inability to build strong customer relationships.
95
the benefits of good data
High quality data can significantly improve the chances of making a good decision. * Good decisions can directly impact an organization's bottom line.
96
data steward
responsible for ensuring data policies and procedures are implemented across an organization
97
Data governance
Refers to the overall management of the availability, usability, integrity, and security of company data
98
Master data management (MDM)
The practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems
99
data validation
Includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data
100
database
maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
101
Database management systems (DBMS)
Allows users to create, read, update, and delete data in a relational database
102
data element
smallest basic unit of data
103
data model
Logical data structures that detail the relationships among data elements using graphics or pictures
104
metadata
details about data
105
data dictionary
Compiles all of the metadata about the data elements in the data model.
106
Entity
A person, place, thing, transaction, or event about which data is stored.
107
Attribute (field, column)
The data elements associated with an entity.
108
primary key
A field (or group of fields) that uniquely identifies a given entity in a table
109
foreign key
A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables
110
Database Advantages
- increased flexibility - increased performance - increased data integrity - reduced data redundance - increased data security
111
Database Advantages: INCREASD FLEXIBILITY
- Have only one physical view - Deals with the physical storage of data on a storage device. * Have multiple logical views – Focuses on how individual users logically access data to meet their own particular
112
data redundancy
The duplication of data or storing the same data in multiple places - Inconsistency is one of the primary problems with redundant data
113
data integriity
measures the quality of data
114
integrity constraint
rules that help ensure the quality of data
115
access level
Determines who has access to the different types of data
116
access control
Determines types of user access, such as read-only access
117
which data is difficult to access
organizational
118
organizational data
- contains structured data in database - contains unstructured data such as voice mail, phone calls, text messages, and video clips
119
Problem with Data and Information
Even in today’s electronic world, managers struggle with the challenge of turning their business data into business intelligence
120
Solution to problem with data and information is Data aggregation which is...
Improving the quality of business decisions has a direct impact on costs and revenue
121
Data Warehouse
A logical collection of data – gathered from many different operational databases – that supports business analysis activities and decision-making tasks. aggregate data throughout an organization into a single repository for decision- making purposes provided the ability to support decision making without disrupting the day-to-day operations
122
Reasons business analysis is difficult from operational systems
* Inconsistent Data Definitions. * Lack of Data Standards. * Poor Data Quality. * Inadequate Data Usefulness. * Ineffective Direct Data Access
123
Data Aggregation
Collection of data from various sources for the purpose of data processing
124
Extraction, transformation, and loading (ETL)
A process that extracts data from internal and external databases, transforms the data using a common set of enterprise definitions, and loads the data into a data warehouse
125
data mart
subset of data warehouse data
126
data cube
The common term for the representation of multidimensional data
127
data lake
A storage repository that holds a vast amount of raw data in its original format until the business needs it
128
dirty data
Erroneous or flawed data
129
data cleaning or scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete data
130
dirty data examples
- duplicated data - incorrect data - misleading data
131
Data: Visualization
- Describes technologies that allow users to “see” or visualize data to transform data into a business perspective Data artists use infographics to display patterns, relationships, and trends in a visual format
132
data visualization tools
Move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more
133
Business intelligence dashboards
Track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis
134
distributed computing
Processes and manages algorithms across many machines in a computing environment
135
ledger
Records classified and summarized transactional data.
136
blockchain
A type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data
137
proof-of-work
A requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain
138
Proof-of-work has two primary goals:
1. To verify the legitimacy of a transaction, or avoid the so-called double-spending 2. To create new digital currencies by rewarding miners for performing the previous task
139
blockchain
Formed by linking together blocks, data structures containing a hash, previous hash, and data
140
genesis block
The first block created in the blockchain
141
hash
A function that converts an input of letters and numbers into an encrypted output of a fixed length
142
proof of stake
A way to validate transactions and achieve a distributed consensus
143
blockchain advantages
* Immutability. * Digital Trust. * Internet of Things Integration.
144
Local area network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home
145
Wide area network (WAN)
Spans a large geographic area such as a state, province, or country
146
Metropolitan area network (MAN)
A large computer network usually spanning a city
147
mobile
Means the technology can travel with the user. For instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference
148
mobile business
The ability to purchase goods and services through a wireless Internet-enabled device
149
wireless
Refers to any type of operation accomplished without the use of a hard- wired connection
150
Wireless fidelity (Wi-Fi)
A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
151
wifi infrastructure
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.
152
bandwidth
The maximum amount of data that can pass from one point to another in a unit of time
153
bit
The smallest element of data and has a value of either 0 or 1
154
bit rate
The number of bits transferred or received per unit of time
155
Wireless Networks
- PANS - WLANS - WMAN - WWAN
156
Personal area networks (PAN)
Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
157
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices
158
Wireless Lan (WLAN)
A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
159
access point q
The computer or network device that serves an as interface between devices and the network
160
wireless access point
Enables devices to connect to a wireless network to communicate with each other
161
multiple in/multiple out technology
Multiple transmitters and receivers allowing them to send and receive greater amounts of data than traditional networking devices
162
Wireless MAN (WMAN)
A metropolitan area network that uses radio signals to transmit and receive data
163
Worldwide Interoperability for Microwave Access (WiMAX)
A communications technology aimed at providing high-speed wireless data over metropolitan area networks.
164
Wireless WAN (WWAN)
A wide area network that uses radio signals to transmit and receive data. Access the text alternative for slide images. 16
165
streaming
A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred
166
streaming data
Data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes (order of kilobytes). 17
167
Smart Phone
Offer more advanced computing ability and connectivity than basic cell phones
168
5G
The fifth-generation wireless broadband technology that will greatly increase the speed and responsiveness of wireless networks
169
WIFI 6
The next generation of Wi-Fi expected to operate at 9.6 Gbps
170
Satellite
A space station that orbits the Earth receiving and transmitting signals from Earth- based stations over a wide area
171
actor
An entity that is capable of participating in an action or a network
172
bad actor
An entity that is participating with ill intentions
173
Wired equivalent privacy (WEP)
An encryption algorithm designed to protect wireless transmission data.
174
Wi-Fi protected access (WPA)
- A wireless security protocol to protect Wi-Fi networks
175
war chalking
The practice of tagging pavement with codes displaying where Wi- Fi access is available.
176
war driving
Deliberately searching for Wi-Fi signals while driving by in a vehicle
177
SSL Certificate
An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
178
Secure hypertext transfer protocol (SHTTP or HTTPS)
A combination of HTTP and SSL to provide encryption and secure identification of an Internet server
179
It Consumerization
The blending of personal and business use of technology devices and applications.
180
pervasive computing
The growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user‘s need to interact with computers as computers
181
Enterprise mobility management (EMM) -
An enterprise wide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets
182
Mobile application management (MAM)
A security strategy that administers and enforces corporate epolicies for applications on mobile devices
183
mobile application development
The set of processes and procedures involved in writing software for use on wireless devices
184
Mobile information management (MIM)
-A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it
185
Fast data
The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value
186
There are three key security considerations to keep in mind as you enter the wireless world:
1, Start with the right equipment 2. Make security an ongoing process, not a one-time event 3. Understand that not all threats are purposeful
187
digital divide
A worldwide gap giving advantage to those with access to technology
188
Areas experiencing tremendous growth using wireless technologies include.
- radio refrequency identification - global positioning - geogrpahic infomraiton
189
Radio frequency identification (RFID)
Uses electronic tags and labels to identify objects wirelessly over short distances
190
RFID tag
An electronic identification device that is made up of a chip and antenna
191
RFID reader
A transmitter/receiver that reads the contents of RFID tags in the area
192
Global positioning system (GPS)
A satellite-based navigation system providing extremely accurate position, time, and speed information
193
Automatic vehicle location (AVL)
Uses GPS tracking to track vehicles
194
Geocache
A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
195
Geocoin
round coin-sized object is unqiuely numbered and hidden geocache
196
(ETA)
Estimated time of arrival
197
Estimated time en route (ETE)
t he time remaining before reaching a destination using the present speed
198
Geographic information system (GIS)
Consists of hardware, software, and data that provide location information for display on a multidimensional map
199
Cartography
The science and art of making an illustrated map or chart
200
GIS map automation
Links business assets to a centralized system where they can be tracked and monitored over time
201
Spatial data
Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
202
geocoding
Spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
203
location based services (LBS)
applications that uses location information to provide a service
204