FINAL PREP Flashcards
PART 1: What law states that performance of a computer doubles every 18 months; and the cost of data processing, communications and storage is essentially ZERO
(Gordon) Moore’s law
PART 1: what are the 4 EMPLOYABILITY SKILLS (ASCE)
Abstract Reasoning:
Manipulate models with a logical or reasonable thought process
Systems Thinking:
Connect inputs and outputs into a sensible whole
Collaboration:
Planning discussions, anticipating reactions
Experimentation:
making a careful analysis of opportunity, envision solutions, and developing ideas with the most promise
PART 1: What is a process and an information system? what is the relationship between them?
process: a way of doing something
IS: collection of components (like a computer) that stores and retrieves data and produces information
A process may use multiple information systems, an information system may be used for multiple processes
PART 1: What is the purpose of Information Systems Management?
Creating/monitoring/adapting processes, IS’, and information to help organizations achieve their strategies
PART 1: What are Porters Five Forces (S.NE.R.PS.PC)
threat of SUBSTITUTIONS
threat of NEW ENTRANTS
existing RIVALS
bargaining POWER of SUPPLIERS
bargaining POWER OF CUSTOMERS
PART 1: What is Porters 4 competitive strategy square
Choose one
“Lowest Cost across industry” = COST + Industry Wide
Lowest cost in segment = Cost + Focus
Better product across industry = Differentiation + Industry
Better Product across segment = Differentiation + Focus
PART 1: what is a value chain
a network of value creating activities
PART 1: What is a value chain according to PORTER (five activities: IL,OL, O, MS, S) (Four support: I,HR,R&D,P)
5:
Inbound Logistics
Operations
Outbound Logistics
marketing and Sales
Service
4:
Infrastructure
HR
R&D
procurement
Part 2: What are the 4 basic types of networks? (WILP)
Wide Area Network (WAN)
Internet
Local Area (LAN)
Personal Area (PAN)
PART 2: Intranet vs Internet
internet: Network of Networks (LANs, WANs, etc)
Intranet: Private internet for an organization
PART 2: WIFI, Cellular networks, and Bluetooth all operate on this
Radio Waves
PART 2: What is a PROTOCOL
a set of rules used by TWO communicating devices
PART 2: What is a SOA
Service-oriented Architecture provides a way for apps on a network to talk to each other
PART 2: What is IoT
Internet of Things are objects connected to the internet that communicate and share data (ex: my lights)
PART 2: What is THREE TIER ARCHITECTURE, what is it made up of?
3ta: way to build and organize software applications
USER TIER
- user interacts with application
SERVER TIER
- application’s data validation, calculations and business rules
DATABASE TIER
- Stores and manages information and data for application
PART 2: the elastic leasing of pooled computer resources over the internet;
organizations just pay for resources they use
What is the cloud
PART 2: 3 types of Cloud options (SIP)
SOFTWARE (SAAS)
PLATFORM (PAAS)
INFRASTRUCTURE (IAAS)
PART 2: what does SAAS provide (3)
Server or disk drive
Server, OS, DBMS
Apps (software, develop suite)
PART 2: what does IAAS provide (3)
Server or Disk drive (storage)
PART 2: what does PAAS provide (3)
server or disk drive
Servers, OS, DBMS,
(Security, Testing for host apps)
PART 2: 4 components of computer hardware with examples
INPUT:
- keyboard and mouse
CPU:
- RAM, Processor, Memory
OUTPUT:
-speakers, display
STORAGE:
-Magnetic disk, optical disk, cloud
PART 2: What is the purpose of an OS (few examples)
Control computers resources
-read and write data
start and stop programs
backup
PART 2: 5 types of SOFTWARE apps, NV HOW
Horizontal-Market:
- common across all industries (Excel)
Vertical-market:
-specific industry (Doctors CRM)
One-of-kind:
-Specific Need (Scotia App)
Native: just one operating system
Web: Browser exclusive (grammarly)
PART 2: 4 sources of apps (OOCO)
Off the Shelf: generic, no customization
OTS with alterations: generic, customized before use
Custom: Specific for business/client
Open source:
Public and can be modified (wikipedia)
- PART 2: what is Virtualization
a process (VM) that allows multiple virtual resources to run on a single physical resource, improving efficiency, scalability, and flexibility.
Can be applied to just about any context of IS (operating system VS, Desktop VS, hardware VS, etc)
PART 3: What is a BUSINESS PROCESS
What do we use to illustrate them
System of ACTIVITIES(tasks) that turn INPUTS into OUTPUTS (ex: getting a new passport)
BPMN Chart
PART 3: Structured vs Dynamic Process
Stuctured:
- Formally defined, standardized process, day-to-day
- (scheduling work shifts)
Dynamic:
- less specific, adaptive, intuitive
-Solving if/where to open new location
PART 3: Data vs information
data = recorded facts
Information = knowledge we derive from those facts
PART 3: qualification of data CARTS
Cost worthy
Accurate
Relevant
Timely
(just) Sufficient
PART 3: what 4 things make up a BP
- Activities
- Resources
- Actors (human/computer hardware resource)
- Role (particular actor for role)
PART 3: 4 characteristics of a Process (L.O.S.S)
- Stability of flow
(structured/dynamic)
Scope
(Managerial/operational/strategic)
- Objectives
(effectiveness/efficientcy)
-Location in VC
(marketing and sales/inbound logistics…)
PART 3: Operational vs Managerial vs Strategic SCOPE of processes
Operational
- daily, computer based, IS = TPS
Managerial
- Seasonal, MIX based, IS = MIS
Strategic
- When needed, People Based, IS = EES
Part 3: How to achieve PROCESS IMPROVEMENT (3 steps) C.U.M
Classify objectives (effective or efficient)
(Make) Unstated Assumptions explicit
Match objectives to strategy
PART 3: What are bottlenecks, what do we do with them
when one activity reduces performance of overall progress,
remove them
PART 3: an island of automation, ISs’ that work in isolation from each other is called what?
a Information Grain Silo
PART 4: a large enterprise IS that brings data together in a big database and helps improve processes in a company is called A …..?
ERP system
PART 4: What is JIT Delivery
Manufacturing occurring just as materials arrive to reduce storage costs
PART 4: what are the 5 Elements of ERP SDHPP
Software
Data
Hardware
Procedures
People
PART 4: ERP; What are the characteristics of SOFTWARE (2) CC 4 ERP
Configuration:
adapting an ERP software to meet client needs without changing code
Customization:
Writing NEW CODE to Supplement ERP system when requirements cannot be met with configuration
PART 4: ERP; What are the types of DATA (3)
Transactional:
-purchases payments, deliveries
Master
-For organization/reference, supplier names, item names
Organizational:
Data ABOUT THE COMPANY, location of warehouses etc
PART 4: Minor, Middle, and Major types of upgrades for ERP
Minor;
technical - improving IT
Middle:
Functional - Improving Processes
Major:
Full system Improvement
PART 4: Pros (5) and challenges (5) of ERP system
Pros
-real time sata sharing
- best industry processes
- more managers = Better oversight
- no information silo
-better for supply chain partners
-create EOS after mergers
Challenges
- Vendor selection
- Gap analysis
- Configuration
- Data issues
- Cutover Method
PART 5: a self describing collection of integrated records OR a collection of tables plus their relationship is called a …?
Database
PART 5: what are the 4 components of a database (cell, column etc)
BFFR (be fkn for real)
Cell = BYTE
collumn = FIELDS
rows = RECORDS
tables = FILES
PART 5: what does DBMS stand for?
What does it mean?
DBMS = Database Management System
A program used to create, process, and administer a database
PART 5: What is an SQL?
Structured Query Language: univeral language for processing database
PART 5: What is Multi user processing?
What is one downside to it?
Multiple users can access the database at the same time?
Could lead to LOST UPDATE problem
PART 5: enterprise DBMS vs Personal DBMS
Enterprise:
process large organizational databases (1000+ users)
personal:
Smaller and simpler database applications (<100, <15)
PART 5: What is an E-R diagram?
What 5 elements is it made up of? PEARF
E-R diagram: Entity relationship diagram
primary key
- column that uniquely identifies row (“Drivers license #)
entity
- Noun that is independent of one another (person, place, object)
Attributes
-Characteristics of an entity (name, ID, etc)
Relationships
- how entities are related
Foreign key
-Shows relationship between 2 entities
PART 5: What is cardinality in a relationship?
Cardinality tells us if the relationships are:
1-1, 1-many, or many-many
Many - many must be broken into two 1-many relationships using a bridge entity.
Part 5: What is Big Data (3 Vs)
vast volumes of structured and unstructured data
volume, Variety, velocity
Part 5: What are the characteristics of the 3 Vs of Big data?
volume
-dataset size
Variety
-types of data within dataset
velocity
-Speed of data processing
Part 6: Definition of AI?
What are the two types of AI objectives
software that enables an IS to mimic or simulate human intelligence
Reasoning systems (think and act as people do)
Pattern matching
(matches perception to stored data and identifies patterns)
Part 6: What are Expert systems
rule based systems that encode data from human knowledge into KNOWLEDGE BASE
Uses If/Then rules
Part 6: What are Neural networks (NN)
adaptive system with NODES and CONNECTIONS (like a brain)… used for things like translation
Part 6: Narrow vs Broad AI
Narrow: accomplishes specific task (grammarly)
broad: flexible (chat)
Part 6: What is an analytics IS?
IS that supports acquiring analyzing and publishing data to reveal patterns
Part 6: What is an operational database?
designed to make data inputs and updates efficient (like online transactions)
Part 6: what is a data warehouse? (OLAP)
a facility that prepares, stores, manages data for reporting and mining.
Part 6: Descriptive (SFGC) vs. Predictive Vs. Prescriptive Analytics
Descriptive:
informs of current conditions
- Sorting, filtering, grouping, calculating
Predictive:
same activities as descriptive but predicts events and outcomes
Prescriptive:
combination of both,
identifies best decisions to take action
PART 7: Cooperation vs Collaboration
Cooperation: people doing all the same work together
Collaboration:
dynamic process working together to achieve shared purpose
Part 7: 3 types of Iteration use
No iteration control;
- no limits or restrictions on team work product
Iteration management:
-Tracks changes and provides features to accommodate people working at the same time
iteration Control:
limits user activity, version history, etc
Part 7: Passive (4) vs Active Social media (6) IS’
Fvvt tcrsc
Passive:
- followers
- views
- visits
- traffic
Active:
- Time on site
- clicks
- retweets
- shares
- comments
- ratings
Part 7: what are the two characteristics of social media promotion
- Network effect:
- exponential sharing - Trust
-consumers trust friends more than businesses
Part 7: What is social capital?
the investment in social relations with the expectations of returns in the marketplace
Part 7: 4 risks of social media in business CURP
- underestimation of labour cost
- variable roi
-customer privacy
-employee being cancelled
Part 7: What is collaborative consumption? Hint (example is also cc)
mutual access to products and services rather than exclusive ownership (creative cloud)
Part 7: 3 types of MERCHANT E-commerce
b2b
b2c
b2g (gov)
Part 7: 3 types of NONMERCHANT e-commerce
Auctions
- ebay
Clearinghouses
-SSense
Electronic exchanges
- Grailed, FB marketplace
Part 7: 3 Ways E-commerce improves market efficiency (DDS)
Data-flow
Disintermediation
Software
PART 8: What is ISS
Information Systems SECURITY
PART 8: Two types of ISS threats
Human Error
(internal employees)
computer Crimes
(External Attackers)
PART 8: 5 types of DATA targeted COMPUTER CRIME Threats HIMIM
hacking
injection (SQL)
malware (Virus, ransomware)
Impersonation (phishing)
Man-in-middle (sniffing)
PART 8: 4 types of SOFTWARE targeted COMPUTER CRIME Threats DOMU
Denial of service
Overflow
Malware
Usurpation
PART 8: 3 types of Hardware targeted COMPUTER CRIME Threat
Terrorism
Theft
APT
PART 8: 4 types of HUMAN ERROR Threats
Inadvertent (idiots)
Deliberate (saboteurs)
Procedure Problems (software)
Accidents (hardware)
PART 8: 6 ISS
safeguards
EF,M,HSV (Fuck em, Genital Herpes)
- Encryption
- Firewalls
- Malware (ANTI)
- Hardening
- VPN
- Secure Design
PART 8:
What is encryption?
converting plaintext into encoded text
PART 8:
What are firewalls?
apparatus that inhibits unauthorized entry into specific sections of a network
PART 8:
What is Anti-malware?
disrupts spyware and virus’
PART 8:
What is hardening?
limiting functions of a computer to decrease vulnerabilities
(good for single purpose computers)
PART 8:
What is Secure Design?
Designing security into a software