CIS Intro Midterm Flashcards

1
Q

What is a Business Process

A

A business process is an ongoing collection of related activities that create a product or service of value to the organization, its business partners, and/or its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three important components of Business Process management?

A

The three important components are process modeling, web-enabling technologies, and business activity monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differentiate the five basic phases of successful Business Process Improvement.

A

BPI generally has the following five phases: define, measure, analyze, improve, and control (DMAIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List and describe the most common used strategies for competitive advantage.

A
Differentiation
Cost Leadership
Innovation
Operational Effectiveness 
Customer Orientation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Differentiation

A

Offer different products, services, and product features than your competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cost Leadership

A

Produce products and or services at the lowest cost in the industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Innovation

A

Introduce new products and services and add new features to existing products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operational Effectiveness

A

The manner in which a firm executes its internal business processes so that it performs certain activities with more quality than its rivals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Customer Orientation

A

Concentrate on making customers happy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compare and contrast mass production and mass customization.

A

They both produce large quantities of products; however, mass production just produces large quantities of identical items while mass customization customizes the items to fit the needs of the customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe two of the major difference between BPI and BPR.

A

BPI is low risk and low cost and does not take much time, whereas BPR is high risk and high cost and can be very time consuming. BPI has a bottom-up approach and incremental change, whereas BPR has a tip-down approach and radical design. Lastly, BPI has quantifiable results and all employees are trained in BPI, whereas BPR’s results can be overwhelming and has a high failure rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between opt-in model and the opt-out model?

A

The Opt-out Model permits the company to collect personal information until the customer specifically requests that the data not be collected while the Opt-in Model prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between digital dossier, profiling, and data aggregators?

A

Digital dossier is data integrated from data gathered about you. It comes from surveillance cameras, credit card transactions, and phone calls. Profiling is the process of forming a digital dossier. Data Aggregators are companies that collect public data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some ways of making a secure password?

A

In order to create a secure password, one must make it difficult to guess. It is better to make passwords as long as possible and make use of uppercase letters and special characters. Passwords should not be recognizable words and should not be the name of anything familiar. Avoid using pet names, family names, etc. Passwords also should not be a recognizable string of numbers i.e. social security numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some reasons as to why it is hard to protect information resources?

A

Many people control or have access to information assets, the amount of computer knowledge to commit computer crimes is minimal, and most organizations simply cannot afford to protect themselves against all possible hazards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why the skills to be a hacker are decreasing?

A

The Internet contains information and computer programs that users can download and use any information system connected to the Internet.

17
Q

What are three problems does database management system minimize? And what do the problems cause?

A

Database management system minimize the problem of data redundancy, isolation, and inconsistency. Data redundancy causes the same data to be stored in various locations and data isolation causes applications to not have access to the data’s that are associated with other applications. Also, data inconsistency is a problem minimized by database management system where multiple copies of a data do not agree to each other.

18
Q

Discuss the advantages and disadvantages of relational databases.

A

Relational databases allow people to compare information quickly by row or column. In addition, items are easy to retrieve by finding the point of intersection of a particular row and column. However, large-scale relational databases can be composed of many interrelated tables, making the overall design complex with slow search and access times.

19
Q

Define Big Data and discuss its basic characteristics.

A

Big Data is composed of high volume, high velocity, and high variety information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization. Big Data has three distinct characteristics, which are volume (vast quantities of data), velocity (flows into an organization at incredible speeds), and variety (different data in differing data formats).

20
Q

Define Data File and discuss its basic characteristics.

A

A data file is a collection of logically related records. In a file management environment, each application has a specific data file related to it. This file contains all of the data records the application requires. Over time, organizations developed numerous applications, each with an associated, application-specific data file.

21
Q

What are the benefits of leveraging Big Data?

A

Leveraging Big Data creates transparency which makes data fluid to use in multiple functional areas. It enables experimentation and segments population to customize actions. Through data leverage of Big Data, human decision making with automated algorithms are replaced. This innovates new business models, products, and services and allows organizations to analyze far more data.

22
Q

List the steps of the Knowledge Management Systems (KMS) Cycle in the appropriate order.

A

1) Create Knowledge
2) Capture Knowledge
3) Refine Knowledge
4) Store Knowledge
5) Manage knowledge
6) Disseminate Knowledge

23
Q

What is the difference between a Primary Key, Composite Key, and Foreign Key?

A

A Primary Key is something that identifies each record in a table, whereas a composite key is 2 or more fields that go together to make a primary key. A foreign Key is different from both because it is a field that identifies a row on a completely different table.

24
Q

Briefly describe Data Mart.

A

A low-cost, scaled down version of a data warehouse designed for end-user needs in a strategic business unit (SBU) or individual department.

25
Q

What is one of the three distinct characteristic of Big Data? Explain how it distinguishes Big Data from traditional data.

A

Velocity: It is the rate at which data if flowing into and organization and over time it’s rapidly increasing. It increases the speed of the feedback between a company and its customers.

26
Q

What are some of the advantages and disadvantages of a twisted-pair wire in comparison to a coaxial cable?

A

Advantages- less expensive, widely available, easier to work with

Disadvantages- lower bandwidth than coaxial, more subject to interference, easily tapped

27
Q

How do Analog and Digital signals differ from one another?

A

Analog signals are waves that transmit information by altering the characteristics of the waves (frequency and amplitude); Digital signals are a series of bits, which allows digital signals to convey information in a binary form that can be read by computers.

28
Q

What are the advantages and disadvantages of Voice-over Internet Protocols (VoIP)? Give one example of such a service.

A

VoIP allows users to make phone or video calls on their computers using the internet on programs such as Skype. Unlike standard phones or cellphones however, VoIP does not have emergency calling services and although recent iterations of VoIP software has improved, voice quality often suffers because of its dependency on a good internet connection.

29
Q

Name and explain the two most common ways to access the internet.

A

Connecting via online service: one can open an account with an internet service provider connecting via other means: internet kiosks in public places for people who do not have their own computer.

30
Q

Compare and contrast the two major types of networks (LAN/WAN).

A

A local area network (LAN) connects two or more devices in a limited space, typically within the same building, with the purpose of giving each device on the network the ability to communicate with each other. A wide area network (WAN) connects devices over a large geographical area, typically by way of LAN-to-LAN connections. WANs are generally provided by large companies that facilitate these connections through large capacities and multiple channels (e.g. the Internet).

31
Q

How does a search engine such as Google.com work?

A

A search engine scans through websites by using web crawler bots. It then will make a copy of the sites meta-data, and index the information.