Midterm 1 Flashcards

(125 cards)

1
Q

What is an information system

A
  • An information system (IS) is a group of components
    that interact to produce information
  • Five fundamental components of computer-based
    information systems are: Hardware, software, data, people, procedures

Information Systems are more than just computers
and software.
§ IS combine the people and procedures they use to
make technology work for business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the characteristics of the five components of IS?

A

Hardware and programs are on the data side, procedures and people are on the human side and date is the bridge between the two sides

Programs and procedures are instructions while people and hardware are actors

To the left automation works to move work from human to computer side and towards the right has an increasing level of difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MIS

A

MIS = Management Information Systems

  • MIS is the development and use of information
    systems to help businesses achieve goals and
    objectives
  • Key terms:
    § Development and use § Information systems
    § Business goals and objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does IS differ from IT

A

Information system (IS) is a system of hardware,
software, data, procedures, and people that produce
information

  • Information technology (IT) represents raw
    technology components of IS
    § Hardware
    § Software
    § Data structure and components

In other words, inventions, standards, products!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does IT fit within IS

A
  • IT alone will not help an organization achieve goals
  • IT must be embedded into an IS to help accomplish
    objectives
    § Technology must be combined with people and procedures to be useful
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the world now “flat” with internet and global
communication? and what challenges does this provide for us

A

▪ Reduced economic advantages of
developed countries
▪ Compete for jobs markets, resources and
even ideas from less developed world

▪ Develop high-level skills through education
▪ On-the-job experience that cannot be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital firm

A
  • NOT about just adding a computer
    system to the mix. Then what is it?
  • information technology as the “core of
    the business” and the primary
    management tool
  • IS allows the firm to response more
    rapidly to changes in their environment
    and thus survives in turbulent times
  • It allows “time-shifting” and “space-
    shifting”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you plan to acquire and use IS

A

▪ Understand how they are created (and cost)
▪ Take an active role in order to insure that system will
meet your and your users’ needs
▪ Determine how to best use the system
▪ Take into account other functions necessary to keep
the system running:
Security, backup and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the six strategic business objectives

A

Operational excellence
New products, services and business models
Customer and Supplier Intimacy
Improved decision making
Competitive advantage
Survival

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is operational excellence

A

improve the efficiency of their operations in
order to achieve higher profitability
* coupled with changes in business practices
and management behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is New products, services, and business
models

A
  • a major enabling tool for firms to create new
    products and services, as well as entirely
    new business models, e.g. Apple Inc.
  • business model describes how a company
    produces, delivers, and sells a product or
    service to create wealth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is customer and supplier intimacy

A
  • Wal-Mart digitally links their suppliers to everyone of
    Wal-Mart’s 5,289 stores worldwide. Suppliers are able to ensure the continuous flow of products to the stores in order to satisfy customer demands
  • Mandarin Oriental uses computers to keep track of
    guests preferences such as room temperature, frequently dialed number, TV channels etc. The digital profile is stored in a central database and be used all over the world
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is improved decision making

A
  • The inability to make informed decision
    resulted in raising costs and lost customers
  • use real-time, accurate data from the
    marketplace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is competitive advantage

A
  • Doing things better than your competitors,
    charging less for superior products, and responding to customers and suppliers in real time
  • Toyota Production System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is survival

A
  • Information systems is not a luxury, they
    are necessities of doing business. Example: Citibank was the first banking firm to introduce ATMs
  • Regulations changed - turn to information systems and technologies in order to comply with the new requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the interdependence between organizations and information technology

A

Hardware data management and telecommunications form software which works with businesses to help them achieve their strategic objectives through businesses processes using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what was the percentage of GDP ICT accounted for in 2019

A

4.8% (94.9 billion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the gap between business leaders and IT leaders

A

Business leaders are strong at business but weak at IT and IT leaders are expert at IT but novice at business. we must bridge that gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is IT’s impact nowadays on organizations

A
  • Allowed the individual to compete with the
    corporation: iStockPhoto
  • Changed music delivery: success of streaming
    services such as Spotify and Apple Music and impact
    on buying music.
  • Disrupting the Taxi industry with Uber and Lyft
  • How about impact on newsprint, textbook publishing,
    traditional software sales, desktop computers, need
    for increased customer service, “customized”
    manufacturing, and much, much more.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Explain Moore’s law with respect to increasing rate of tech

A
  • “The number of transistors per square inch on an
    integrated chip doubles every 18 months.”
    ▪ The speed of a computer chip doubles every 18
    months
    ▪ Price/performance ratio of computers has fallen dramatically
  • Computers are smaller * Computers are less expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What id disruptive tech

A

a new technology that changes or transforms the industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is data

A

recorded facts or figures
not meaningful on their own and requires context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is information

A
  • Information is data with a meaning!
    – It is the central focus of information systems
    – It is used and created by activities
    – Business processes create, process and store information
    – “Information Systems” support business processes by automating or
    facilitating the creation, processing, and storage of information
  • The concept of Information can be difficult to define
    – Data presented in a meaningful context
    – Processed data
    – Data processed by summing, ordering, averaging, grouping, comparing, or
    other similar operations – A difference that makes a difference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

explain perspectives on information systems

A

data combines with info to form an information system which provides value

Raw data from a supermarket checkout counter can be processed and organized to produce meaningful information, such as the total unit sales of dish detergent or the total sales revenue from dish detergent for a specific store or sales territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what makes good information and what is most important
accurate Timely Relevant Just barely sufficient worth its cost Most important are accurate and timely
26
what is the role of information in business processes
* Business processes use, generate and store information: – Business processes bring together important items of data in context * Eg. Quantity received = 6, Shipping Invoice = 8 T hese should be equal. There is a problem. * Business Processes bring together information so it can be understood at various levels(??) * Information from business processes are useful for managerial and strategic decisions
27
what do business activities use information systems for
– Automate the generation of information – Manipulate and store data and information – Uncover new and novel methods (activities) to make the entire business process more efficient
28
what is required for an information system to be used effectively
U sing information systems effectively requires an understanding of the organization, management, and information technology shaping the systems. An information system creates value for the firm as an organizational and management solution to challenges posed by the environment.
29
what are the dimensions of information systems
– Organizations * It usually has a hierarchical structure * It has different business functions * Business process: formal and informal rules * Culture: set of fundamental values and assumptions – Management * To make sense out of many situations and solve problems * Also creative work! Design new products and even recreate the organization – Technology Change in process leads to change in structure which leads to change in decisions Management must support correct incentives and train properly
30
How do the three dimensions relate to business
– Management (M) * Determine Business strategies * Select new products and services – Organization (O) * Implement these strategies * Work with outside parties etc. – Technology (T) * Provide the means to implement the strategies * Such as a electronic platform or network etc.
31
Review slide 16 of lecture 3
THIS IS IMPORTANT BRAYDEN DONT SKIP OVER THIS YOU FUCKING DUMBO
32
what are the different decision levels and wear systems do they use to make them
* Operational decisions concern day-to-day activities – transaction processing systems (TPS) * Managerial decisions concern the allocation and utilization of resources – management information systems (MIS) * Strategic decisions concern broader-scope, organizational issues – executive information systems (EIS)
33
what is a TPS and what strategic bus objective can it meet
– Transaction processing systems * The operational level of the organization include various units such as order processing, material movement control, payroll, accounts payable, and employee record keeping etc. * The information systems used in this level of the organization are transaction processing systems (TPS), so called because they record the routine transactions that take place in everyday operations. * The transaction processing system records the data from everyday operations throughout every division or department in the organization. Each division/department is tied together through the TPS to provide useful information to management levels throughout the company. Operational excellence
34
what is an MIS
– Management information systems * Those using management information systems (MIS) require information on a periodic basis instead of on a daily recurring basis like those using a transaction processing system. The MIS will also draw data from the transaction processing system to help managers answer structured questions * Managers also require information on an exception basis. * A management information system is used by managers throughout the organization to help them in directing, planning, coordinating, communicating, and decision making.
35
What is a DSS
– Decision-support systems * An MIS uses internal data to supply useful information. A DSS uses internal data but also combines it with external data to help analyze various decisions management must make. Analyzing complex, interactive decisions is the primary reason for a company to use a DSS. * There are a lot of gray areas in successfully managing an organization and the larger the company, the more diverse the decision-making process becomes. * Decision-support systems are used for complex “what-if” questions that require internal and external data. Decisions at this management level are mostly semistructured so the information system must respond to the unique requirements of the executives.
36
what is an ESS
– Executive support systems * They are used at the very top of management. At the strategic level, the typical decision is very unstructured. Often there is no specific question, but rather a series of undefined situations executives may face. * There are no easy, definable answers. These executives require summarized, historical information gleaned from all other levels of the organization, coupled with large amounts of external data gathered from many sources. * Executive support systems must be easy to use and the information must be easily manipulated. The ESS must be able to incorporate external information with internal data to offer concise, complete information for the imprecise and incomplete scenarios executives face. And most importantly, the systems must have a fast response time. * Senior executives often access information through the use of a portal.
37
how do all these business information systems relate to one another
TPS extracts processes and adds analysis models and external data to become MIS or DSS and from there it adds a wider range of information to suit specific needs to become ESS
38
what is a structured vs unstructured decision and who makes the,
* A structured decision is one for which there is an understood and accepted method for making the decision – Example: How much tax do I need to pay? * An unstructured decision process is one for which there is no agreed-on decision-making method – Example: Whom should I marry? * Note: terms structured and unstructured refer to the decision process/method, not to the underlying subject/problem Operational managers (TPS) make structured Managerial (MIS) do both Strategic executives (EIS) make unstructured decisions
39
what is a computer at it's most basic level
Accept input (raw data) Process that data Produce output (information)
40
explain computers in the 50's
* General-Purpose Mainframe and Minicomputer Era: 1959 to Present – The mainframe era began with highly centralized computing with networks of terminals concentrated in the computing department – While early models contained proprietary software and data, today’s mainframes are able to process a wide variety of software and data. – IBM began this era and remains the single largest supplier of mainframe computing.
41
what is a mini computer
– Minicomputers are defined as middle- range computer. – These powerful machines cost much less than mainframes, and make decentralization possible. – They can be customized to the specific needs of individual departments or business units rather than time sharing on a single huge mainframe.
42
what is the client server era
* Client/Server Era: 1983 to Present – As the desktop and laptop personal computers became more powerful and cheaper, businesses began using them to replace mini-computers and some mainframe computers by networking them together. wired means safer and better and that's when the computers are physically linked to the server
43
what is the enterprise internet computing era
* Enterprise Internet Computing Era: 1992 to Present – Many firms found it difficult to integrate all of their local area network ( LANs) – The problems created by proprietary, closed systems are being solved by the standards and open-source software created in this era, such as TCP/IP (internet protocol) for communication IT makes things cheaper – Also need software such as ERP to link all separate application together – The promises of delivering critical business information painlessly and seamlessly are getting more difficult because of the ever- changing landscape of technology products and services.
44
What is the cloud computing era
* Cloud Computing era (2000 to Present) – This model of computing relies on the massive computing centers owned by the likes of Google, IBM, Microsoft, and even Amazon.com. – “What is Google's cloud? It's a network made of hundreds of thousands, or by some estimates 1 million, cheap servers, each not much more powerful than the PCs we have in our homes. – It stores staggering amounts of data, including numerous copies of the World Wide Web. This makes search faster. – Unlike many traditional supercomputers, Google's system never ages. When its individual pieces die, usually after about three years, engineers pluck them out and replace them with new, faster boxes. – “This means the cloud regenerates as it grows, almost like a living thing.” ( Google and the Wisdom of Clouds, BusinessWeek, Dec 24, 2007)
45
What are networking personal computers, LANs and WANs
* Networking Personal Computers – Critical to the rapid adoption of personal computers and rise of social networks. – Local Area Networks (LANs) * linking many personal computers together * shared access to data, printers, and other peripheral devices – Wide Area Networks (WANs) * the Internet * email * web browsing
46
what is the internet of things
* Networking is not just about personal computing devices * The Internet of Things is about connecting “dumb” devices to make them smart, for example: – Thermostats – Smoke alarms – Refrigerators – Coffee makers – …and other machines
47
what is hardware and it's categories
* Hardware consists of electronic components used to input, process, output, and store data * Basic hardware categories: – Input – Processing – Output – Storage
48
explain input process output and storage
Input (keyboard, mouse, scanner ect) goes to be processed (CPU and Main memory) where information can be moved back and forth between storage (Magnetic disk and optical disk) and then moves to output (video display, printer, speaker, etc)
49
What are some common input and output devices
slide 31 and 32 for examples and categories
50
Explain computer data
* Binary Digits (bits) – Used to represent data * Represented as either zero ( 0) or one (1) * Bytes – Bits grouped in 8-bit chunks (represent one character) – Specifications for size of memory * K kilobyte1024 bytes * MB megabyte 1024 K * GB gigabyte 1024 MB * TB terabyte 1024 GB
51
what is the data hierarchy
A computer system organizes data in a hierarchy that starts with the bit, which represents either a 0 or a 1. Bits can be grouped to form a byte to represent one character, number, or symbol. Bytes can be grouped to form a field, and related fields can be grouped to form a record. Related records can be collected to form a file, and related files can be organized into a database. database File record field Byte Bit
52
What do you need to set up a network
a PC (not a motherboard)
53
What is CPU RAM and ROM
* Central Processing Unit ( CPU) (microprocessor and memory) – Transfers program or data from disk to main memory – Moves instruction from main memory via data channel or bus * Random Access Memory (RAM) (Primary storage) – Volatile (turn computer off, RAM goes away) – Working memory... like a blackboard – Contains running program instructions – Contains running Operating System (OS) instructions * Read Only Memory (ROM) (primary storage) – Non-volatile (stays when power is off) – Used to “boot-up” machine
54
what is secondary storage
flash memory fixed disks Optical disks the cloud
55
what is flash memory
There are two types of flash memory: * Flash memory device – very small storage device that plugs into a USB port (e.g. USB key) * Flash memory card – high capacity storage card that is inserted into a reader which in turn plugs into a USB port (e.g. digital camera memory)
56
what is fixed disks
* Fixed Disk Drives (Mechanical Hard Drives ) – Capacity is measured in bytes – GB (Gigabytes) – Common storage size 1000 GB – 8000 GB (8 TB or TeraByte) * Solid State Hard drives (SSD) – Uses flash memory for storage purposes – Very fast but expensive – Common storage sizes 128 GB – 1 TB – 1 TB SSD sells around $500 Not ideal cuz they move
57
What is an optical disk
* Compact Disks (CD) – Read Only Memory (CD-ROM) – CD-ROM, CD-R, CD-RW – Store up to 700 MB of data * Digital Versatile (or Video) Disk (DVD) – DVD-ROM, DVD-R, DVD+/-R DL, DVD-RW – Stores up to 8.5 GB of data * Blu-ray – – BD: High density DVD (uses blue laser) that stores up 25 GB (single layer) or 50 GB (Dual Layer) – BDXL: newest standard with storage capacities of 128 GB
58
What is the cloud
* Cloud storage is hard drive space accessible via the internet * Becoming popular with Tablets and mobile devices * Convenient for working on same data files using multiple devices * Commercial services: iCloud, OneDrive, Google Drive, DropBox (and many, many more) * Be aware of national storage laws (protection of privacy issues) * We have SFU Vault at this school.
59
what is the difference between a client and a server
* Client computers used to review and process information – Eg, word processing, spreadsheets, database access – Connect to servers for Web, e-mail, database * Servers provide access to information and application ( serve the clients servers, order processing servers, video servers, and many, many more. – The “Cloud” is a term assigned to servers accessible anywhere and anytime (over the internet) ) – Faster, larger, more powerful – Include, database servers, email servers, web servers, application servers, sms Clients request a domain and the server responds with a content page or error code
60
what os the human to computer interface
User Application program Operating system Computer BIOS
61
What is firmware
* Computer software installed into devices – Printers, print servers, communication devices – Coded like other software – Installed into read-only memory * becomes part of device’s memory – Can be changed and upgraded * Basic Input/Output System (BIOS) – Instructions stored in ROM installed on the motherboard – Used when a computer is initially booted up
62
what Are the computer software types
Two types: 1. Operating System (OS) * program that controls computer’s resources 2. Application Programs * perform specific user tasks * Constraints – a particular version of an operating system is written for a particular type of hardware – application programs are written to use a particular operating system
63
what are the major operating systems
* Windows (Microsoft) – Used by ~ 91% of the world’s desktops (73% of all computing devices) * Mac OS (Apple) – Used by ~ 7% of the world’s desktops – Apple Computer, Inc. developed for Macintosh computers * Linux (Open Source – What is it?) – Used by ~ 1.7% of the world’s desktops * Mobile Operating Systems – iOS (Apple) 27%, Android (Google) 67%, WindowsPhone (Microsoft) 2%
64
what are the infrastructure components
Internet platforms Computer hardware platforms Operating system platforms Enterprise software platforms Telecommunication platforms consultant and system integrators data management and storage
65
what is the difference between owning and listening a program and how do you acquire application software
* Users buy license to use program * Ownership remains with development company * Linux belongs to everyone (open-source) – No license fee – Can modify but any modification must be made public and free – Companies make money by offering support * Application Software consists of programs that perform a business function – Some are general purpose (ie, MS Office) – Some are specific (ie, Student information management system – SFU’s SIMS) * Application software acquisition – Buy off-the-shelf * may not be a good fit * may need alterations – Custom-developed software * tailor-made for organization
66
what are the application software categories
* Horizontal-market application software – Provides capabilities common across all organizations and industries – Typically general purpose software * Examples: Word, Excel, PowerPoint, Acrobat, Photoshop, Paint Shop Pro * Vertical-market application software – Serves need of specific industry – Usually can be altered or customized * Examples: dental billing system, restaurant order processing system * One-of-a-kind application software – Designed for specific need * Example: Quicktax software (income tax preparation software) * Other (dual-category) application software – Software that doesn’t fit clearly in other categories * Example: CRM (Customer relationship management software) * Custom developed software – Created by the company for the company
67
explain viruses and security implications
* Virus – Computer program that replicates itself – Consumes computer resources * payload causes unwanted activity * Macro viruses – Attached to various types of documents – When document opened, virus placed in startup files of the application – After, virus infects every file the application creates or processes * Worm – Virus that propagates using Internet or network – Spread faster than other viruses – Specifically programmed to spread – Actively use the network to spread – Choke networks making them unusable
68
How do you prevent viruses
* Patch security holes – check vendors regularly * Never download from unknown sites * Don’t open email attachments from strangers * Don’t open unexpected email attachments * Don’t rely on file extensions * Purchase licenses for products that detect and eliminate viruses – If you have a virus: * follow instructions to remove it * may need to delete it by reformatting and reinstall clean
69
Define telecommunication
The electronic transfer of data is called Telecommunications The transfer can occur between people or machines Two people talking on a telephone is Telecommunication
70
Define communications Media
The transfer of electronic data occurs through Communications Media Several media exist including: Twisted Pair Copper Coaxial Cable Fiber Optic Cable Wireless Technology
71
what are the two basic ways to send data
Analog continuously varying frequency smooth but inaccurate series of bits (high voltage = 1, low voltage = 0) accurate and choppy
72
Define network
A computer Network is a collection of computers that communicate with one another over transmission lines A network can be as small as two machines or large enough to connect many machines across several continents
73
define protocols
The procedures used to transfer information between machines are called Protocols Protocols ensure that the data being sent by one machine, will be recognized by other machines receiving the data Two machines must agree on the protocol to use, and they must follow that protocol as they send messages back and forth
74
what is a computer network and what are the three types
* A computer network is a collection of computers that communicate with one another over transmission media * Three basic types: – Local Area Network (LAN) – Wide Area Network (WAN) – Really, really large network (Internet)
75
What is a local area network LAN and what are their components
* LAN connects computers residing in a single physical site – Two to several hundred computers – One “small” geographic area – Communication lines can be placed where the organization wants * A LAN typically requires – File server for storing shared files – Print sever for sharing a single printer – Application server for sharing applications – Switch: special purpose device (eg, router or a computer) that controls data traffic flow on LAN – Network Interface Card (NIC): hardware that connects computers together (ie, where you plug-in the network cable.
76
what is a LAN with wireless connection
Wireless NIC (WNIC) * LAN operation – NICs operate on 802.3 protocol (Ethernet) – WNICs operate on 802.11 protocol (Wi-Fi) * 802.11b is slower than 802.11g which is slower than 802.11n * 802.11n is the current standard – WNICs connect to Access Point (AP)
77
what is a wide area network WAN
* WAN connects computers in different geographical areas – Two or more separated sites * Uses communication networks from vendors – Licensed by government * An Intranet is a controlled, self contained grouping of information resources that can be accessed within a single company using Web browsers * An Extranet is similar to an Intranet but is designed to facilitate communications between two or more business partners
78
Is the internet a network? explain
* Network of networks * Connect LANs and WANs * Uses a variety of communication methods and conventions – Seamless flow of data provided by layered protocol * set of standard rules and procedures enabling machines to communicate * The Internet is a network, this means: – Each and every computer on the Internet has a unique address – Standards for how to transfer files between computers must exist – Methods for transporting files across the network must exist * To accomplish this, the network is divided into Layers
79
what are the layers of network
1. Network access layer - equipment, signalling and communication between machines- transmits within a single network (LAN) 2. Internet Layer - works with IP address organization and timing constraints- transmission across internets 3. Transport Layer - opening and maintaining connections uses the transmission control program to ensure packets are received with correct content - transmission across internet 4. Application layer - Data passed between program and the transport layer -program for mail web browsing and file transfer
80
explain step 1 of the layers of network
* The address is defined in the Internet Protocol (IP) and is called an IP Number – This "IP number" is a four byte value that, is expressed by converting each byte into a decimal number (0 to 255) and separating the bytes with a period. This is known as IPv4. – For example, the web server at SFU has the IP address 142.58.102.68
81
How does the network know where you want to go without putting in the IP address
* The Domain Name System (DNS) is a distributed Internet directory service (database). DNS is used mostly to translate between domain names and IP addresses, and to control Internet email delivery.
82
Hoe does the DNS work
* When you type in a URL, your browser sends a request to the closest name server. If that server has ever fielded a request for the same host name it will locate the information and reply. * If the name server is unfamiliar with the domain name, the resolver will attempt to "solve" the problem by asking a server farther up the tree. If that doesn't work, the second server will ask yet another - until it finds one that knows.
83
Explain step 2 of the layers of network
* Now that we know the address for our request, we have to get our request ready to send * This is a job for HTTP * Hyper Text Transfer Protocol (HTTP) – HTTP is the Internet protocol for transferring hypertext files – HTTP handles * Requests for Uniform Resource Locator (URL) * Responses (usually HTML) from the request – It requires the host to use an HTTP server program, and the viewer to use a HTTP browser * In Short: Hyper Text Transfer Protocols (HTTP) help us to send web pages across the web
84
what are other transfer protocols on the internet
* File Transfer Protocol (FTP) help us to send files across the network * BitTorrent Transfer files using peer-to-peer (P2P) file sharing * Post Office Protocol (POP) help us receive mail messages across the web. Server assumes one client * Internet Message Access Protocol (IMAP) help us receive mail messages across the web. Server assumes multiple clients.
85
Explain step 3 of the layers of network
* Now that we have created the HTTP request, we have to deliver that request to the correct address * This is a job for TCP and IP – TCP and IP always work together, that’s why they are called TCP/IP
86
What is TCP
TCP: Transmission Control Protocol * TCP controls data “packets”. * Responsible for verifying the correct delivery of data from client to server. * Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger re-transmission until the data is correctly and completely received.
87
How does tcp relate to step 3 of the layers of network
TCP: Transmission Control Protocol * TCP fragments large HTTP data units – sequence number added to each TCP data unit * TCP is a connection-oriented protocol – reliable (error correction and detection) – retransmission of lost or damaged data units
88
What is IP
IP: Internet Protocol * Responsible for moving packet of data from computer to computer * IP carries each message as a collection of packets * IP forwards each packet based on a four byte destination address (the IP number) * IP operates on gateway machines that move data from department to organization to region and then around the world
89
What is packet switching
moving data across the internet in tiny bits and assembling it to form a website or information
90
what are the 5 stages of packet switching
Step 1: Creates packets – Each message is split into small packets by a packet assembler/disassembler (PAD) – A header identifies destination, number of packets, and packet order Step 2: “Who’s your daddy” protocol © – Each packet takes their own path through the network – At each node they ask “Are you my daddy?” – If yes, they are collected, if no they are sent on Step 3: Re-assembly – Once all of the packets reach the destination nodes they are reassembled by the PAD into the original message Step 4: * Once TCP/IP has done its job, the request for a page at a URL is received at the server * This request is processed through HTTP on the server * Each request will be provided with a response Step 5: * The request triggers a response * The response is generated by HTTP and is carried back to the requestor using TCP/IP * In our case, the response is a small file containing HTML
91
what is a firewall
* Firewall is a device that prevents unauthorized network access * May be special-purpose computer or program * Organizations may have multiple firewalls – perimeter firewalls sit outside organizational network – internal firewalls are inside network – packet-filtering firewalls examine source address, destination address, and other data before allowing message to pass – may filter both incoming and outgoing messages * Access Control List (ACL) encodes rules stating what packets are allowed or prohibited
92
What is a VPN and why is it important
* Virtual Private Network (VPN) – Uses public Internet or private internet to create appearance of private point- to-point connections – Client and server have point-to-point connection called a tunnel * private pathway over shared network – Secure, encrypted communications
93
what is a VoIP and creepy crawlers
* Voice over Internet Protocol (VoIP) – Sends packets containing voice conversation across the Internet – Commercial VoIP services use broadband – VoIP to VoIP phone calls can be free * Web Crawlers and Search Engines – Search engines are used to search for information on the Internet – Web crawlers browse the web to find URLs – Search engine indexing * creates indexes for the results from the web crawling
94
how do we solve the problem of – Data fragmented in isolated databases and files – Time-consuming reporting processes – Outdated data management technology
– Replace disparate systems with enterprise system, with centralized mainframe and data management system
95
what are the problems with managing data in a traditional file environment
* Problems with the traditional file environment (files maintained separately by different departments) – Data redundancy: * Presence of duplicate data in multiple files Data inconsistency: * Same attribute has different values – Program-data dependence: * When changes in program requires changes to data accessed by program – Lack of flexibility – Poor security – Lack of data sharing and availability
96
what is traditional file processing
each section of a company (accounting, marketing etc) have their own program and use a master file to retrieve data. This leads to data redundancy, inconsistent and wasted storage resources
97
define content and conflict management
[The Long Definition] * Content is related to intellectual property – a form of creative endeavour that can be protected through a trademark, patent, copyright, industrial design, or integrated circuit topography * Varies by industry * Organizations may store data, documents, spreadsheets, presentations, web pages, text from blogs and discussion boards, graphics, video files, audio files, etc. [The short Definition] * Content – The data, graphics, sound, images, and video that are of importance to the organization
98
Define content management
* Content Management – Creating, storing, and editing the content an organization has captured * Content management includes – database management systems (DBMS) * Enables integration with multiple applications – content management system (CMS) * Used to format the presentation of data to a uniform standard * Content management managerial challenge – processing and storing the right content – getting the right content to the right person in the right format at the right time
99
what is the difference between spreadsheets and data bases
Spreadsheet and database keep track of things, but… * Spreadsheets – Keep lists typically involving a single important thing (ie, concept) * Eg, lists of MP3 songs you have * Databases – Keep multiple lists of related things (themes) * Eg, lists of artists, albums, as well as MP3 songs
100
what is the data heirarchy (from bottom to top)
database (many tables and their relations) Table (many records of same info) Record (some related fields) Field (many bytes) Byte (8 bits) Bit
101
what are bits and bytes
With Information Systems, all content is stored in digital form * Bit: Smallest unit is a bit which represents either 1 or 0 * Byte: A byte = 8 bits the most common storage unit One byte can be translated into a Character For example the byte “01000001” = “A"
102
What is a field
* A Field is a representation of one fact, that is an attribute of a thing or an event – e.g., name, account number, account balance, date * Types of fields: – Character strings (text) – Numeric: decimal / binary fixed point / floating point character (special representation) – Logical (can be one of 'true' or 'false') – Special: date, currency, memo...
103
what is a record and what are the two types
* A Record is a group of logically related fields – Examples: * Student Name, Student Number, Address * Account number, Name, Deposit amount * Course name, Course number, Course description * Date, Order number, Order amount, Sales tax Master record: * A record representing the status of a business entity * Examples: a customer account, an inventory item record Transaction record: * A record representing an event (change) in the business * Examples: a payment made, an invoice issued, inventory reduction
104
What is a table and what is a primary key
A Table (also called File) is a set of records about a thing or event Records (info in boxes) Field (category of records) A Primary Key is a field (or a set of fields) that uniquely identifies records
105
what is a data base and what are relational database tables
* A Database is a set of tables that are related logically (tables + relationship amongst rows in tables + metadata) A relational database organizes data in the form of two-dimensional tables. Illustrated here are tables for the entities SUPPLIER and PART showing how they represent each entity and its attributes. Supplier Number is a primary key for the SUPPLIER table and a foreign key for the PART table.
106
what is the difference between data and meta data
* The main difference between Data and Metadata is that data is simply the content that can provide a description, measurement, or even a report on anything relative to an enterprise's data assets. On the other hand, metadata describes the relevant information on said data, giving them more context for data users. * Databases are self-describing – contains, within itself, a description of its contents * Metadata – Data that describe data – Makes databases more useful – Makes databases easier to use
107
What is a relational database
Multiple tables that work together to provide information. for example one table one table has students and their student numbers and another has student numbers and GPA's the two allow you to relate a student to a GPA
108
what are the types of relationships
one to one (person to show size) One to many (name of person to number of friends) Many to Many (students to courses)
109
what are the components of a database application system
user Database application Database management system (DBMS) Database
110
what is a DBMS and what does it do
* Database Management System (DBMS) is a system that creates, process, and administers databases – Usually licensed from vendors, eg * Microsoft SQL * Microsoft Access (personal DBMS) * Oracle * MySQL (open-source) * DBMS and database are two different things! * DBMS is used to create tables, relationships and other structures in the database * DBMS manages access to databases – Applications use DBMS to read, insert, modify, or delete data – Structured Query Language (SQL) * international standard for processing a database * DBMS administers databases – Can be used to set up security – Used to back up data – Add structure to improve performance – Remove data
111
what is a database application
* A database application is a collection of forms, reports, queries, and application programs that process a database, and make its contents more accessible and useful * Databases can have more then one application * Applications can have multiple users * Database Application Programs – Process logic specific to business need – Some enable data processing over Internet * serves as intermediary between Web server and database * responds to events * reads, inserts, modifies, deletes data
112
what is a form report and queries
* Forms (User Interface) – Used to read, insert, modify, and delete data * Reports (Output) – Show data in structured context – May compute values * Queries (data processing) – Means of getting answers from database data
113
What is multi user processing
* Multi-user processing is common. It is – The use of the system by multiple users – Sometime simultaneously * Unique problems – Lost-update problem – Locking used to coordinate activities of multiple users * creates new set of problems – Data conflicts produce inaccurate results
114
what is the difference between an enterprise and personal DBMS
* Enterprise DBMS – Process large organizational and workgroup databases – Supports multi-users * e.g. DB2, MS SQL, Oracle, MySQL * Personal DBMS – Designed for smaller, simpler database applications – Supports fewer users (2 to 20 is common) * e.g. Access, dBase, FoxPro, Paradox, R:Base
115
what is normalized tables
* First Normal Form * No table may have repeating columns that contain the same kind of data * All columns must contain only one value * There must be a primary key that uniquely defines rows * It basically deals with redundancy of data across a horizontal row * Second Normal Form * It deals with redundancy of data in vertical columns * To achieve 2NF, your tables must already be in 1NF * Identify any columns that repeat their values across multiple rows * Those columns need to be placed in their own table and reference by a key value in the original table * Look for attributes in the table that aren’t dependent on the primary key * Third Normal Form * You may not even need to do anything with your database for 3NF * Look for data in your tables that’s not fully dependent on the primary key, but dependent on another value in the table * For example component of address can be seen as not being directly related to the user. Street relies on Zip code, which relies on city; and the city relies on the state * In this case, to satisfy 3NF, the address must be split into 3 more tables containing Zip, Cities, and States. This will prevent misspelling but is it necessary? * 3NF may create more tables than you will want to manage. It is up to you to decide where to stop * However, must at least satisfy the 2NF * Make sure that the same value is not stored in more than one place
115
what is normalized tables
* Referential integrity rules * Used by RDMS to ensure relationships between tables remain consistent * Entity-relationship diagram – Used by database designers to document the data model – Illustrates relationships between entities – Caution: If a business doesn’t get data model right, system won’t be able to serve business well
116
what can you do with content
* RETRIEVE: locate and obtain required data * STORE: save new data so it can be found * MODIFY: change existing data * DELETE: delete existing data – All this should be done efficiently, that is: with an acceptable level of resource use
117
what are the two transaction processing concepts
* An Entity: A thing whose status is relevant to the operation and management of the organization * An Event: A change (transaction) in the status of at least one entity
118
what is big data
* Massive sets of unstructured/semi-structured data from Web traffic, social media, sensors, and so on * Petabytes, exabytes of data * Volumes too great for typical DBMS * Can reveal more patterns and anomalies
119
what are analytical tools
* Analytical tools: Relationships, patterns, trends – Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions * Multidimensional data analysis (OLAP) * Data mining * Text mining * Web mining
120
what are managerial data issues
* Content: What data should be collected? * Access: What data should be given to what users? * Logical structure: How will the data be organized to make sense to a particular user? * Physical organization: Where will the data actually be located? establishing an information policy Ensuring data quality data quality audit Data cleaning
121
what is establishing information policy
– Firm’s rules, procedures, roles for sharing, managing, standardizing data – Data administration * Establishes policies and procedures to manage data – Data governance * Deals with policies and processes for managing availability, usability, integrity, and security of data, especially regarding government regulations – Database administration * Creating and maintaining database
122
what is ensuring data quality
– More than 25 percent of critical data in Fortune 1000 company databases are inaccurate or incomplete – Redundant data – Inconsistent data – Faulty input – Before new database in place, need to: * Identify and correct faulty data * Establish better routines for editing data once database in operation
123
what is a data quality audit
* Data quality audit: – Structured survey of the accuracy and level of completeness of the data in an information system * Survey samples from data files, or * Survey end users for perceptions of quality
124
what is data cleansing
* Data cleansing – Software to detect and correct data that are incorrect, incomplete, improperly formatted, or redundant – Enforces consistency among different sets of data from separate information systems