exam 2 Flashcards

(76 cards)

1
Q

traditional file systems

A

stores groups of records used by a particular software application together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

problems with traditional file systems

A

inability to share data,
inadequate security,
allows data duplication (redundancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

database

A

a set of logically related stored data in a shared repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

database management system (DBMS)

A

program that creates, processes, and administers databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the four DBMS operations

A

read, insert, modify, delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how do database applications make databases more useful?

A

forms, reporting, queries, application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hierarchy of data elements

A

bytes - fields - records - tables - databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bytes grouped into…

A

columns/fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

columns grouped into…

A

rows/records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rows grouped into…

A

tables/files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

metadata

A

data that describes data, makes databases more useful and easier to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the three relationships among records

A

primary keys, foreign keys, relational databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

primary keys

A

column(s) that identify UNIQUE rows in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

foreign keys

A

when primary keys exist in another table (NOT unique here)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

relational databases

A

databases using tables, keys, and foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three functions of DBMS

A
  1. creating the database & structure
  2. processing the database
  3. administering the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business process

A

network of activities that generate value by transforming inputs into outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

structured business processes

A

very formal, standardized process, usually in day-to-day operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

examples structured business processes

A

customer returns, order entry, purchasing, payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dynamic business processes

A

informal, flexible, adaptive, involves strategic/less structured managerial decisions and activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

examples of dynamic business processes

A

collaboration; social networking; ill-defined, ambiguous situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

common workgroup processes

A

exist to enable workgroups to fulfill the goals or purposes of their department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

examples of workgroups

A

sales & marketing, operations, manufacturing, customer service, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

three variations of scope

A

workgroup (smallest),
enterprise,
inter-enterprise (largest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
work groups
10-100 individuals, formalized procedures, change is difficult
26
enterprise
100-1000 users, spans a whole organization, very formal, highly documented, formal training
27
inter-enterprise
1000+ users, mandatory training, formalized procedures
28
two ways to improve process quality
efficiency and effectiveness
29
process efficiency
measure of the ratio of outputs into inputs
30
process effectiveness
measure of how well a process achieves organizational strategy
31
information silo
when data is isolated in separate info systems
32
problems of information silos
data duplicated, data inconsistency, disjointed processes, inefficient, increased cost
33
business process reengineering (BPR)
altering and designing business processes to take advantage of new info. systems
34
three major enterprise applications
CRM, ERP, EAI
35
what does CRM stand for?
customer relationship management
36
CRM
manage all interactions with customer through four phases of the customer life cycle
37
four phases of the customer life cycle
1. marketing 2. customer acquisition 3. relationship management 4. loss/churn
38
what does ERP stand for?
enterprise relationship planning systems
39
ERP
a suite of applications (modules), a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform
40
what is the primary purpose for ERP?
integration, allows real-time updates
41
what does EAI stand for?
enterprise application integration
42
EAI
a suite of software applications that integrates EXISTING systems by providing layers of software that connect applications - enables gradual move to ERP
43
five challenges when implementing enterprise systems
1. collaborative management 2. identifying requirement gaps 3. transition problems 4. employee resistance 5. new technology
44
what is systems development?
the process of creating and maintaining info. systems - involves 5 components of the IS model
45
five components of the IS model
hardware, software, data, procedures, people
46
five requirements of IS developemt
1. establishing system goals 2. setting up the project 3. determining requirements 4. business knowledge and management skill 5. coordinated teamwork of both specialists and non-specialists w/ business knowledge
47
risks of system development
many projects never finished, over budget, won't accomplish goals, high risk of failure
48
challenges of systems development
determining requirements, changes in requirements, schedules & budgeting, changing technology, diseconomies of scale
49
Brook's Law
adding more people to a late project makes the project later
50
five phases of the systems development life cycle (SDLC)
1. system definition 2. requirements analysis 3. component design 4. implementation 5. system maintenance
51
system definition phase of SDLC
first phase - define system goals and scope, assess feasibility (cost, schedule, technical)
52
requirements analysis phase of SDLC
second phase - most important & difficult, determine functions and features needed
53
component design phase of SDLC
third phase - determine hardware/software specifications, design database, procedures, and job definitions
54
implementation phase of SDLC
fourth phase - four approaches to conversion (4 Ps), build, test, conduct, and convert
55
four ways of implementing an IS (4 Ps)
pilot, phased, parallel, plunge
56
maintenance phase of SDLC
fifth phase - failure or enhancements
57
problems with SDLC
difficulty documenting requirements, analysis paralysis, scheduling and budgeting difficulties, long projects
58
elements of IS security
threat, vulnerability, safeguard, target
59
threat
person/org. seeking to obtain data/other assets illegally, without owner's permission or knowledge
60
vulnerability
approach for threats to gain access to individual or organizational assets
61
safeguard
measures to block threat from obtaining asset
62
three sources of threats
1. human error (accidental, mistakes) 2. computer crime (hackers, viruses, worms) 3. natural disasters (fires, floods, etc.)
63
five types of security loss
1. unauthorized data disclosure (pretexting, phishing, spoofing) 2. incorrect data modification 3. faulty service 4. denial of service 5. loss of infrastructure
64
goal of info. systems security
find appropriate trade-off between risk of loss and cost of implementing safeguards
65
personal security safeguards
take security seriously, strong/updated passwords, use trusted vendors, clear browsing history
66
organizational security safeguards
technical, data, human, in-house staff, nonemployee personnel
67
what components of IS are in technical safeguards
hardware and software
68
technical safeguards
1. identification and authentication 2. encryption 3. firewalls 4. malware protection
69
malware
file or code, typically delivered over a network, that infects, explores, steals, or conducts any behavior an attacker wants
70
spyware
software that gathers information about a user, without their knowledge, and sends it to another party
71
adware
software that automatically displays or downloads advertising material
72
what components of IS are in data safeguards
data
73
data safeguards
define data policies, data rights & responsibilities, authentication, backup & recovery procedures, physical security
74
what components of IS are in human safeguards
procedures and people
75
human safeguards for employees
position definition, hiring and screening, dissemination and enforcement, termination
76
human safeguards for nonemployees
appropriate screening and security training, specify security responsibilities in contract