Info Systems Exam One Flashcards

(117 cards)

1
Q

Information System (IS)

A

collects, processes, stores, analyzes, and disseminates information for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning (B, C, D, A, K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information

A

refers to data that have been organized so that they have meaning and value to the recipient (ex. GPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Knowledge

A

consists of data and/or information that have been organized and processes to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer-based information system (CBIS)

A

information system that uses computer technology to perform some or all of its intended tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information technology components

A

hardware: consists of devices such as processor, monitor, keyboard, keyboard, and printer
software: program or collection of programs that enable the hardware to process data
database: collection of related files or tables containing data
network: connecting system that enables multiple computers
procedures: instructions for combining that above components to process information and generate desired output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information technology infrastructure

A

IT components plus IT services (refer to visual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application

A

computer program designed to support a specific task or business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Functional area information system (FAIS)

A

collection of application programs in a single department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enterprise resource planning systems (ERP)

A

two information systems that support the entire organization. transaction processing systems, are designed to correct a lack of communication among the functional are IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction processing system (TPS)

A

supports monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inter-organizational information systems (IOSs)

A

IS that connect two or more organizations
ex. supply chain management (flow of materials)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic commerce systems (e-commerce)

A

enable organizations to conduct transactions, called business-to-business electronic commerce, and customers to conduct transactions with businesses called business-to-consumer electronic commerce e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Knowledge workers

A

experts in a particular subject area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business analytics systems

A

provide computer-based support for complex, non routine decisions, primarily for middle managers and knowledge workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Expert systems

A

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dashboards

A

special form of IS that supports all managers of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does IT do to middle managers?

A

reduces the number, makes them more productive, and increase the number of employees who can report to a single manager, provides them with real-time information, makes their jobs more stressful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Potential IT impacts on non managerial workers

A

eliminate jobs, cause employees to experience a loss of identity, cause job stress and physical problems such as repetitive stress injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Positive and negative societal effects of increased use of IT

A

positive: provide opportunities for people with disabilities, provide flexibility, robots take over mundane chores, improvements in health care

negative: cause health problems, place employees on constant call, potentially misinform patients about health problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Competitive advantage

A

assets that provide an organization with an edge against its competitors in some measure, such as cost, quality, or speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Business process

A

ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fundamental elements of business process

A

inputs: materials, services, and information that flow through and are transformed as a result of process activities
resources: people and equipment that perform process activities
outputs: product or service created by the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Metrics for assessing business processes

A

efficiency: doing things well in the process, without delay or without wasting money or resources
effectiveness: focuses on doing things that matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cross-functional processes
processes that cut across multiple functional areas
26
Three areas IS plays a vital role in business processes
executing the process, capturing and storing process data, monitoring process performance
27
Business environment
combo of social, legal, economic, physical, and political factors in which businesses conduct their operations
28
Globalization
integration and interdependence of economic, social, cultural, and ecological facets of life, made possible by rapid advances in information technology
29
Market pressures
globalization, changing nature of workforce, powerful customers
30
Technology pressures
technological innovaation/obsolescence, information overload
31
Societal/political/legal pressures
social responsibility, compliance with government regulations, protection against terrorist attacks, ethical issues
32
Digital divide
refers to wide gap between those individuals who have access to information and communications technologies and those who don't
33
Responses to various pressures
strategic systems, customer focus, make-to-order and mass customization, e-business/e-commerce
34
Competitive strategy
statement that identifies a business's approach to compete, its goals, and the plans and policies that will be required to carry out those goals
35
Strategic information systems (SISs)
provide a competitive advantage bu helping an organization to implement its strategic goals and improve its performance and productivity
36
Michael Porter's competitive forces model
1. threat of entry of new competitors: high when entry is easy and low when there are significant barriers to entry 2. bargaining power of suppliers: supplier power is high when buyers have few choices from whom to buy and low when buyers have many choices 3. bargaining power of customers (buyers): buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices 4. threat of substitute products or services: if many alternatives to an organization's products or services, the threat of substitutes is high 5. rivalry among existing firms in the industry: threat from rivalry is high when there is intense competition among many firms in an industry
37
Entry barrier
product or service feature that customers have learned to expect from organizations in a certain industry
38
Value chain
sequence of activities through which the organization's inputs, whatever they are, are transformed into more valuable outputs, whatever they are
39
Value chain model
identifies points for which an organizations can use information technology to achieve a competitive advantage
40
Primary vs. support activities
Primary: relate to the production and distribution of the firm's products and services Support: do not add value directly to the firm's products or services
41
Value system
includes the suppliers that provide the inputs necessary to the firm along with their value chains
42
Strategies to counter five competitive forces identified by Porter
1. cost leadership strategy: produce products and services at the lowest cost in the industry 2. differentiation strategy: offer different products, services, or product features than your competitors innovation strategy: introduce new products and services, add new features to existing products and services, or develop new ways to produce them 4. operational effectiveness strategy: improve manner in which a firm executes its internal business processes more effectively 5. customer orientation strategy: concentrate on making customers happy
43
Business-IT alignment
tight integration of the IT function with the organization's strategy, mission, and goals
44
Ethics
principle of right and wrongs that individuals use to make choices that guide their behavior
45
Utilitarian approach
ethical action is the one that provides the most good or does the least harm
46
Rights approach
maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties
47
Fairness approach
ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard
48
Common good approach
highlights the interlocking relationships that underlie all societies
49
Deontology approach
states that the morality of an action is based on whether that action itself is right to wrong under a series of rules rather than based on the consequences of that action
50
General framework for ethics
1. recognize an ethical issue 2. get the facts 3. evaluate alternative actions 4. make a decision and test it 5. act and reflect on the outcome of your decision
51
Code of ethics
collection of principles intended to guide decisions making by members of the organization
52
Fundamental tenets of ethics
responsibility: means that you accept the consequences of your decisions and actions accountability: refers to determining who is responsible for actions that were taken liability: legal concept that gives individuals the right to recover the damages done to them by other individuals
53
Ethical issues of IT
privacy issues: involve collecting, storing, and disseminating info about individuals accuracy issues: involve the authenticity, fidelity, and correctness of information that is collected and processed property issues: involve the ownership and value of information accessibility issues: revolve around who should have access to information and water they should pay a fee for this access
54
Information privacy
right to determine when and to what extent information about you can be gathered or communicated to others
55
Two rules for privacy
1. right of privacy is not absolute, must be balanced against needs of society 2. public's right to know supersedes the individual's right to privacy
56
Digital dossier
electronic profile of you and your habits done through profiling
57
opt-out and opt-in model
out: informed consent permits the company to collect personal information until the customer specifically requests that the dat not be collected in: prohibits an organization from collecting any personal information unless the customer specifically authorizes it
58
Information security
refers to all of the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
59
threat, exposure, and vulnerability
threat: information resource is any danger to which a system may be exposed exposure: information resource is the harm, loss, or damage that can result if a threat compromises that resource vulnerability: possibility that a threat will harm that resource
60
Five factors that contribute increasing vulnerability of organizational information resources
1. today's interconnected, interdependent, wirelessly networked business environment 2. smaller, faster, cheaper computers and storage devices 3. decreasing skills necessary to be a computer hacker 4. international organized crime taking over cybercrime 5. lack of management support
61
trusted vs. untrusted network
trusted: any network within your organization untrusted: any network external to your organization
62
Cybercrime
refers to illegal activities conducted over computer networks, particularly the internet
63
Unintentional threat
acts performed without malicious intent that nevertheless represent a serious threat to IS ex. human error social engineering
64
Deliberate threat to IS
1. espionage/trespass 2. information extortion 3. sabotage or vandalism 4. theft of equipment or information 5. identity theft 6. compromises to intellectual property 7. software attacks 8. alien software 9. supervisory control and data acquisition (SCADA) attacks 10. cyberterrorism and cyberwarfare
65
Intellectual property (trade secret, patent, copyright)
Intellectual property: property created by individuals or corporations trade secret: intellectual work, such as a business plan, that is a company secret and is not based on public information patent: official document that grants the holder exclusive rights on an invention or a process for a specified period of time copyright: statutory grant that provides the creators or owners of intellectual property with ownership of the property with ownership of the property
66
Maleare
malicious software used to infect as many computers worldwide as possible
67
Ransomware
digital extortion, blocks access to a computer system or encrypts an organization's data until organization pays a sum of money
68
Alien software
clandestine software that is installed on your computer through duplicitous methods
69
Adware, spyware, spamware
adware: software that causes pop-up advertisements to appear on your screen spyware: software that collects personal information about users without their consent (keystroke loggers and screen scrapers) spamware: pestware that uses your computer as a launch pad for spammers
70
Cyberterrorism
malicious acts in which attackers use a target's computer systems, particularly through the internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda
71
Controls
designed to protect all of the components of an information system, including data, software, hardware, and networks ex. physical controls (walls, doors, fencing, gates), access controls (authentication and authorization), and communication controls (firewalls, anti-malware systems, VPNs)
72
Firewall
system that prevents a specific type of information from moving between untrusted networks, such as the internet, and private networks, such as your company's network
73
VPN
virtual private network, private network that uses a public network (usually the internet) to connect users
74
Business continuity
chain of events linking planning to protection and to recovery
75
Computer network
system that connects computers and other devices through communications media so that data and information can be transmitted among them
76
Bandwidth and broadband
bandwidth: transmission capacity of a network; it is stated in bits per second broadband: transmission capacity of communications medium faster than 25 megabits per second for download
77
Network ranges smallest to largest
personal are networks (PANs), local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs)
78
LAN and WAN
Local area network: connects two or more devices in a limited geographical region, usually within the same building wide area network: network that covers a large geographical area (at&t)
79
Enterprise network and corporate backbone networks
enterprise network: all networks that are interconnected backbone networks: high-speed central networks to which multiple smaller networks connect
80
Communications channel
cable (twisted-pair wire, coaxial cable, fiber-optic cable) and broadcast (microwave, satellite, radio, or infrared)
81
Two major types of protocols
ethernet: common LAN protocol transmission control protocol/internet protocol (TCP/IP): disassembling, delivering, and reassembling the data during transmission
82
Hypertext transfer protocol (HTTP)
defines how messages are formulated and how they are interpreted by their receivers
83
Internet backbone
primary network connections and telecommunications lines that link the nodes
84
Intranet vs. extranet
intranet: network that uses IP so that users can take advantage of familiar applications and work habits extranet: connects parts of the intranets of different organizations
85
Internet Service Provider
ISP: company that provides internet connections for a fee (Xfinity), connect to one another through network access points
86
Internet Protocol Address
IP address: distinguishes it from all other computers, consists of sets of number, in four parts, separated by dots
87
World Web Web
system of universally accepted standards for storing, retrieving, formatting, and displaying information through a client/server architecture
88
Common methods for accessing the internet
dial-up, DSL, cable modern, satellite, wireless, and fiber to the home
89
Hardware
physical equipment used for the input, processing, output, and storage activities of a computer system
90
Trends in hardware
becoming smaller, faster, cheaper, and more powerful over time
91
What does hardware consist of?
Central processing unit (CPU): manipulates the data and controls the tasks performed by the other components primary storage: temporarily stores the data and program instructions during processing secondary storage: stores data and programs for future use input technologies: accept data and instructions and convert them to a form that the computer can understand output technologies: present data and information in a form people can understand communication technologies: provide for the flow of data from external computer networks to the CPU, and from the CPU to computer networks
92
Mainframes, microcomputers, and laptops
mainframes: remain popular in large enterprises for extensive computing applications that are accessed by thousands of users at one time (airline reservations) microcomputers: personal computers, smallest and least expensive category of general-purpose computers laptop computers: small, easily transportable, lightweight microcomputers that fit comfortably into a briefcase
93
Supercomputers
does not refer to a specific technology, indicates the fastest computers available at any given time
94
thin client vs. fat client
thin: computer that does not offer the full functionality of a PC fat: computer that has the ability to perform many functions without a network connection
95
Types of input devices
human data-entry: require certain amount of human effort to input data (gesture recognition) source-data automation: devices input data with minimal human intervention (barcode readers)
96
Output technologies
output generated by a computer can be transmitted to the user through several output devices and media (monitors, printer, plotters, and voice)
97
CPU
performs the actual computation or "number crunching: inside any computer, it is a microprocessor aka a "chip"
98
Primary vs. secondary storage
primary: stores small amounts of data and information that the CPU will use immediately secondary: which stores much larger amounts of data and information
99
Byte
eight-bit string processed by CPUs
100
Three types of information for primary storage
1. data to be processed by the CPU 2. instructions for the CPU as to how to process the data 3. operating system programs that manage various aspects of the computer's operation
101
Types of primary storage
register: least capacity, storing extremely limited amounts of instructions and data only immediately before and after processing , cache memory: type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory , random access memory: part of primary storage that holds a software program and small amounts of data of processing, and read-only memory: nonvolatile, retain instructions when the power to the computer is turned off
102
Characteristics of secondary storage
nonvolatile, takes more time to retrieve data from it than from RAM, cheaper than primary storage, use a variety of media, each with its own technology
103
Types of secondary storage
Magnetic tape: kept on a large open reel or in a smaller cartridge or cassette, cheap yet hold lots of data Magnetic disks most common due to low cost, high speed, and large storage capacity , solid-state drives: storage devices that serve the same purpose as a hard drive and store data in memory chips, optical storage devices: do not store data through magnetism rather laser reads the surface of a reflective plastic platter
104
Software
computer hardware is only as effective as the instructions you give it, contained in the software
105
Computer programs
sequences of instructions for the computer; process of writing, to coding, programs is called programming
106
Two type of software
systems software and application software
107
Software issues
software defects, software licensing, open systems (group of computing products that work together), open-source software (proprietary software: purchased software that has restrictions on its use, copying, and modification)
108
Systems software
set of instructions that serves primarily as an intermediary between computer hardware and application programs
109
Operating system
the "director" of your computer system's operations. Supervises the overall operation of the computer by monitoring the computer's status, scheduling operations, and managing input and output processes
110
Graphical user interface
GUI: allows users to directly control the hardware by manipulating visible objects (such as icons) and actions that replace complex commands
111
Social interface
guides user through computer applications by using cartoon-like characters, animation, and voice commands
112
application software
set of computer instructions that provides specific functionality to a user ex. general word processing, or narrow, such as an organization's payroll program
113
package/software suite
group of programs with integrated functions that has been developed by a Endor and is available for purchase in a prepackaged form
114
Personal application software
help individual users increase their productivity
115
Speech-recognition software
input technology, rather than strictly an application, that enables users to provide input to systems software and application software
116
General functions of the operating system
manage actual computer resources, schedule/process applications, manage/protect memory, manage input and output functions/hardware
117
Major types of application software
spreadsheet, data management, word processing, desktop publishing, graphics, multimedia, communications, speech recognition, and groupware