exam 2 Flashcards

1
Q

traditional file systems

A

stores groups of records used by a particular software application together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

problems with traditional file systems

A

inability to share data,
inadequate security,
allows data duplication (redundancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

database

A

a set of logically related stored data in a shared repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

database management system (DBMS)

A

program that creates, processes, and administers databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the four DBMS operations

A

read, insert, modify, delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how do database applications make databases more useful?

A

forms, reporting, queries, application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hierarchy of data elements

A

bytes - fields - records - tables - databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bytes grouped into…

A

columns/fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

columns grouped into…

A

rows/records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rows grouped into…

A

tables/files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

metadata

A

data that describes data, makes databases more useful and easier to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the three relationships among records

A

primary keys, foreign keys, relational databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

primary keys

A

column(s) that identify UNIQUE rows in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

foreign keys

A

when primary keys exist in another table (NOT unique here)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

relational databases

A

databases using tables, keys, and foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three functions of DBMS

A
  1. creating the database & structure
  2. processing the database
  3. administering the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business process

A

network of activities that generate value by transforming inputs into outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

structured business processes

A

very formal, standardized process, usually in day-to-day operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

examples structured business processes

A

customer returns, order entry, purchasing, payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dynamic business processes

A

informal, flexible, adaptive, involves strategic/less structured managerial decisions and activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

examples of dynamic business processes

A

collaboration; social networking; ill-defined, ambiguous situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

common workgroup processes

A

exist to enable workgroups to fulfill the goals or purposes of their department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

examples of workgroups

A

sales & marketing, operations, manufacturing, customer service, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

three variations of scope

A

workgroup (smallest),
enterprise,
inter-enterprise (largest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

work groups

A

10-100 individuals, formalized procedures, change is difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

enterprise

A

100-1000 users, spans a whole organization, very formal, highly documented, formal training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

inter-enterprise

A

1000+ users, mandatory training, formalized procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

two ways to improve process quality

A

efficiency and effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

process efficiency

A

measure of the ratio of outputs into inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

process effectiveness

A

measure of how well a process achieves organizational strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

information silo

A

when data is isolated in separate info systems

32
Q

problems of information silos

A

data duplicated, data inconsistency, disjointed processes, inefficient, increased cost

33
Q

business process reengineering (BPR)

A

altering and designing business processes to take advantage of new info. systems

34
Q

three major enterprise applications

A

CRM,
ERP,
EAI

35
Q

what does CRM stand for?

A

customer relationship management

36
Q

CRM

A

manage all interactions with customer through four phases of the customer life cycle

37
Q

four phases of the customer life cycle

A
  1. marketing
  2. customer acquisition
  3. relationship management
  4. loss/churn
38
Q

what does ERP stand for?

A

enterprise relationship planning systems

39
Q

ERP

A

a suite of applications (modules), a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform

40
Q

what is the primary purpose for ERP?

A

integration, allows real-time updates

41
Q

what does EAI stand for?

A

enterprise application integration

42
Q

EAI

A

a suite of software applications that integrates EXISTING systems by providing layers of software that connect applications - enables gradual move to ERP

43
Q

five challenges when implementing enterprise systems

A
  1. collaborative management
  2. identifying requirement gaps
  3. transition problems
  4. employee resistance
  5. new technology
44
Q

what is systems development?

A

the process of creating and maintaining info. systems - involves 5 components of the IS model

45
Q

five components of the IS model

A

hardware, software, data, procedures, people

46
Q

five requirements of IS developemt

A
  1. establishing system goals
  2. setting up the project
  3. determining requirements
  4. business knowledge and management skill
  5. coordinated teamwork of both specialists and non-specialists w/ business knowledge
47
Q

risks of system development

A

many projects never finished,
over budget,
won’t accomplish goals,
high risk of failure

48
Q

challenges of systems development

A

determining requirements,
changes in requirements,
schedules & budgeting,
changing technology,
diseconomies of scale

49
Q

Brook’s Law

A

adding more people to a late project makes the project later

50
Q

five phases of the systems development life cycle (SDLC)

A
  1. system definition
  2. requirements analysis
  3. component design
  4. implementation
  5. system maintenance
51
Q

system definition phase of SDLC

A

first phase - define system goals and scope,
assess feasibility (cost, schedule, technical)

52
Q

requirements analysis phase of SDLC

A

second phase - most important & difficult,
determine functions and features needed

53
Q

component design phase of SDLC

A

third phase -
determine hardware/software specifications,
design database, procedures, and job definitions

54
Q

implementation phase of SDLC

A

fourth phase -
four approaches to conversion (4 Ps),
build, test, conduct, and convert

55
Q

four ways of implementing an IS (4 Ps)

A

pilot, phased, parallel, plunge

56
Q

maintenance phase of SDLC

A

fifth phase -
failure or enhancements

57
Q

problems with SDLC

A

difficulty documenting requirements, analysis paralysis, scheduling and budgeting difficulties, long projects

58
Q

elements of IS security

A

threat, vulnerability, safeguard, target

59
Q

threat

A

person/org. seeking to obtain data/other assets illegally, without owner’s permission or knowledge

60
Q

vulnerability

A

approach for threats to gain access to individual or organizational assets

61
Q

safeguard

A

measures to block threat from obtaining asset

62
Q

three sources of threats

A
  1. human error (accidental, mistakes)
  2. computer crime (hackers, viruses, worms)
  3. natural disasters (fires, floods, etc.)
63
Q

five types of security loss

A
  1. unauthorized data disclosure (pretexting, phishing, spoofing)
  2. incorrect data modification
  3. faulty service
  4. denial of service
  5. loss of infrastructure
64
Q

goal of info. systems security

A

find appropriate trade-off between risk of loss and cost of implementing safeguards

65
Q

personal security safeguards

A

take security seriously, strong/updated passwords, use trusted vendors, clear browsing history

66
Q

organizational security safeguards

A

technical,
data,
human,
in-house staff,
nonemployee personnel

67
Q

what components of IS are in technical safeguards

A

hardware and software

68
Q

technical safeguards

A
  1. identification and authentication
  2. encryption
  3. firewalls
  4. malware protection
69
Q

malware

A

file or code, typically delivered over a network, that infects, explores, steals, or conducts any behavior an attacker wants

70
Q

spyware

A

software that gathers information about a user, without their knowledge, and sends it to another party

71
Q

adware

A

software that automatically displays or downloads advertising material

72
Q

what components of IS are in data safeguards

A

data

73
Q

data safeguards

A

define data policies, data rights & responsibilities, authentication, backup & recovery procedures, physical security

74
Q

what components of IS are in human safeguards

A

procedures and people

75
Q

human safeguards for employees

A

position definition,
hiring and screening,
dissemination and enforcement,
termination

76
Q

human safeguards for nonemployees

A

appropriate screening and security training,
specify security responsibilities in contract