Info Systems Exam One Flashcards

1
Q

Information System (IS)

A

collects, processes, stores, analyzes, and disseminates information for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning (B, C, D, A, K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information

A

refers to data that have been organized so that they have meaning and value to the recipient (ex. GPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Knowledge

A

consists of data and/or information that have been organized and processes to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer-based information system (CBIS)

A

information system that uses computer technology to perform some or all of its intended tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information technology components

A

hardware: consists of devices such as processor, monitor, keyboard, keyboard, and printer
software: program or collection of programs that enable the hardware to process data
database: collection of related files or tables containing data
network: connecting system that enables multiple computers
procedures: instructions for combining that above components to process information and generate desired output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information technology infrastructure

A

IT components plus IT services (refer to visual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application

A

computer program designed to support a specific task or business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Functional area information system (FAIS)

A

collection of application programs in a single department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enterprise resource planning systems (ERP)

A

two information systems that support the entire organization. transaction processing systems, are designed to correct a lack of communication among the functional are IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction processing system (TPS)

A

supports monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inter-organizational information systems (IOSs)

A

IS that connect two or more organizations
ex. supply chain management (flow of materials)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic commerce systems (e-commerce)

A

enable organizations to conduct transactions, called business-to-business electronic commerce, and customers to conduct transactions with businesses called business-to-consumer electronic commerce e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Knowledge workers

A

experts in a particular subject area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business analytics systems

A

provide computer-based support for complex, non routine decisions, primarily for middle managers and knowledge workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Expert systems

A

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dashboards

A

special form of IS that supports all managers of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does IT do to middle managers?

A

reduces the number, makes them more productive, and increase the number of employees who can report to a single manager, provides them with real-time information, makes their jobs more stressful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Potential IT impacts on non managerial workers

A

eliminate jobs, cause employees to experience a loss of identity, cause job stress and physical problems such as repetitive stress injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Positive and negative societal effects of increased use of IT

A

positive: provide opportunities for people with disabilities, provide flexibility, robots take over mundane chores, improvements in health care

negative: cause health problems, place employees on constant call, potentially misinform patients about health problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Competitive advantage

A

assets that provide an organization with an edge against its competitors in some measure, such as cost, quality, or speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Business process

A

ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fundamental elements of business process

A

inputs: materials, services, and information that flow through and are transformed as a result of process activities
resources: people and equipment that perform process activities
outputs: product or service created by the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Metrics for assessing business processes

A

efficiency: doing things well in the process, without delay or without wasting money or resources
effectiveness: focuses on doing things that matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cross-functional processes

A

processes that cut across multiple functional areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Three areas IS plays a vital role in business processes

A

executing the process, capturing and storing process data, monitoring process performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Business environment

A

combo of social, legal, economic, physical, and political factors in which businesses conduct their operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Globalization

A

integration and interdependence of economic, social, cultural, and ecological facets of life, made possible by rapid advances in information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Market pressures

A

globalization, changing nature of workforce, powerful customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Technology pressures

A

technological innovaation/obsolescence, information overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Societal/political/legal pressures

A

social responsibility, compliance with government regulations, protection against terrorist attacks, ethical issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Digital divide

A

refers to wide gap between those individuals who have access to information and communications technologies and those who don’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Responses to various pressures

A

strategic systems, customer focus, make-to-order and mass customization, e-business/e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Competitive strategy

A

statement that identifies a business’s approach to compete, its goals, and the plans and policies that will be required to carry out those goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Strategic information systems (SISs)

A

provide a competitive advantage bu helping an organization to implement its strategic goals and improve its performance and productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Michael Porter’s competitive forces model

A
  1. threat of entry of new competitors: high when entry is easy and low when there are significant barriers to entry
  2. bargaining power of suppliers: supplier power is high when buyers have few choices from whom to buy and low when buyers have many choices
  3. bargaining power of customers (buyers): buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices
  4. threat of substitute products or services: if many alternatives to an organization’s products or services, the threat of substitutes is high
  5. rivalry among existing firms in the industry: threat from rivalry is high when there is intense competition among many firms in an industry
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Entry barrier

A

product or service feature that customers have learned to expect from organizations in a certain industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Value chain

A

sequence of activities through which the organization’s inputs, whatever they are, are transformed into more valuable outputs, whatever they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Value chain model

A

identifies points for which an organizations can use information technology to achieve a competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Primary vs. support activities

A

Primary: relate to the production and distribution of the firm’s products and services
Support: do not add value directly to the firm’s products or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Value system

A

includes the suppliers that provide the inputs necessary to the firm along with their value chains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Strategies to counter five competitive forces identified by Porter

A
  1. cost leadership strategy: produce products and services at the lowest cost in the industry
  2. differentiation strategy: offer different products, services, or product features than your competitors
    innovation strategy: introduce new products and services, add new features to existing products and services, or develop new ways to produce them
  3. operational effectiveness strategy: improve manner in which a firm executes its internal business processes more effectively
  4. customer orientation strategy: concentrate on making customers happy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Business-IT alignment

A

tight integration of the IT function with the organization’s strategy, mission, and goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Ethics

A

principle of right and wrongs that individuals use to make choices that guide their behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Utilitarian approach

A

ethical action is the one that provides the most good or does the least harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Rights approach

A

maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Fairness approach

A

ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard

48
Q

Common good approach

A

highlights the interlocking relationships that underlie all societies

49
Q

Deontology approach

A

states that the morality of an action is based on whether that action itself is right to wrong under a series of rules rather than based on the consequences of that action

50
Q

General framework for ethics

A
  1. recognize an ethical issue
  2. get the facts
  3. evaluate alternative actions
  4. make a decision and test it
  5. act and reflect on the outcome of your decision
51
Q

Code of ethics

A

collection of principles intended to guide decisions making by members of the organization

52
Q

Fundamental tenets of ethics

A

responsibility: means that you accept the consequences of your decisions and actions
accountability: refers to determining who is responsible for actions that were taken
liability: legal concept that gives individuals the right to recover the damages done to them by other individuals

53
Q

Ethical issues of IT

A

privacy issues: involve collecting, storing, and disseminating info about individuals
accuracy issues: involve the authenticity, fidelity, and correctness of information that is collected and processed
property issues: involve the ownership and value of information
accessibility issues: revolve around who should have access to information and water they should pay a fee for this access

54
Q

Information privacy

A

right to determine when and to what extent information about you can be gathered or communicated to others

55
Q

Two rules for privacy

A
  1. right of privacy is not absolute, must be balanced against needs of society
  2. public’s right to know supersedes the individual’s right to privacy
56
Q

Digital dossier

A

electronic profile of you and your habits done through profiling

57
Q

opt-out and opt-in model

A

out: informed consent permits the company to collect personal information until the customer specifically requests that the dat not be collected
in: prohibits an organization from collecting any personal information unless the customer specifically authorizes it

58
Q

Information security

A

refers to all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

59
Q

threat, exposure, and vulnerability

A

threat: information resource is any danger to which a system may be exposed
exposure: information resource is the harm, loss, or damage that can result if a threat compromises that resource
vulnerability: possibility that a threat will harm that resource

60
Q

Five factors that contribute increasing vulnerability of organizational information resources

A
  1. today’s interconnected, interdependent, wirelessly networked business environment
  2. smaller, faster, cheaper computers and storage devices
  3. decreasing skills necessary to be a computer hacker
  4. international organized crime taking over cybercrime
  5. lack of management support
61
Q

trusted vs. untrusted network

A

trusted: any network within your organization
untrusted: any network external to your organization

62
Q

Cybercrime

A

refers to illegal activities conducted over computer networks, particularly the internet

63
Q

Unintentional threat

A

acts performed without malicious intent that nevertheless represent a serious threat to IS
ex. human error social engineering

64
Q

Deliberate threat to IS

A
  1. espionage/trespass
  2. information extortion
  3. sabotage or vandalism
  4. theft of equipment or information
  5. identity theft
  6. compromises to intellectual property
  7. software attacks
  8. alien software
  9. supervisory control and data acquisition (SCADA) attacks
  10. cyberterrorism and cyberwarfare
65
Q

Intellectual property (trade secret, patent, copyright)

A

Intellectual property: property created by individuals or corporations
trade secret: intellectual work, such as a business plan, that is a company secret and is not based on public information
patent: official document that grants the holder exclusive rights on an invention or a process for a specified period of time
copyright: statutory grant that provides the creators or owners of intellectual property with ownership of the property with ownership of the property

66
Q

Maleare

A

malicious software used to infect as many computers worldwide as possible

67
Q

Ransomware

A

digital extortion, blocks access to a computer system or encrypts an organization’s data until organization pays a sum of money

68
Q

Alien software

A

clandestine software that is installed on your computer through duplicitous methods

69
Q

Adware, spyware, spamware

A

adware: software that causes pop-up advertisements to appear on your screen
spyware: software that collects personal information about users without their consent (keystroke loggers and screen scrapers)
spamware: pestware that uses your computer as a launch pad for spammers

70
Q

Cyberterrorism

A

malicious acts in which attackers use a target’s computer systems, particularly through the internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda

71
Q

Controls

A

designed to protect all of the components of an information system, including data, software, hardware, and networks
ex. physical controls (walls, doors, fencing, gates), access controls (authentication and authorization), and communication controls (firewalls, anti-malware systems, VPNs)

72
Q

Firewall

A

system that prevents a specific type of information from moving between untrusted networks, such as the internet, and private networks, such as your company’s network

73
Q

VPN

A

virtual private network, private network that uses a public network (usually the internet) to connect users

74
Q

Business continuity

A

chain of events linking planning to protection and to recovery

75
Q

Computer network

A

system that connects computers and other devices through communications media so that data and information can be transmitted among them

76
Q

Bandwidth and broadband

A

bandwidth: transmission capacity of a network; it is stated in bits per second
broadband: transmission capacity of communications medium faster than 25 megabits per second for download

77
Q

Network ranges smallest to largest

A

personal are networks (PANs), local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs)

78
Q

LAN and WAN

A

Local area network: connects two or more devices in a limited geographical region, usually within the same building
wide area network: network that covers a large geographical area (at&t)

79
Q

Enterprise network and corporate backbone networks

A

enterprise network: all networks that are interconnected
backbone networks: high-speed central networks to which multiple smaller networks connect

80
Q

Communications channel

A

cable (twisted-pair wire, coaxial cable, fiber-optic cable) and broadcast (microwave, satellite, radio, or infrared)

81
Q

Two major types of protocols

A

ethernet: common LAN protocol
transmission control protocol/internet protocol (TCP/IP): disassembling, delivering, and reassembling the data during transmission

82
Q

Hypertext transfer protocol (HTTP)

A

defines how messages are formulated and how they are interpreted by their receivers

83
Q

Internet backbone

A

primary network connections and telecommunications lines that link the nodes

84
Q

Intranet vs. extranet

A

intranet: network that uses IP so that users can take advantage of familiar applications and work habits
extranet: connects parts of the intranets of different organizations

85
Q

Internet Service Provider

A

ISP: company that provides internet connections for a fee (Xfinity), connect to one another through network access points

86
Q

Internet Protocol Address

A

IP address: distinguishes it from all other computers, consists of sets of number, in four parts, separated by dots

87
Q

World Web Web

A

system of universally accepted standards for storing, retrieving, formatting, and displaying information through a client/server architecture

88
Q

Common methods for accessing the internet

A

dial-up, DSL, cable modern, satellite, wireless, and fiber to the home

89
Q

Hardware

A

physical equipment used for the input, processing, output, and storage activities of a computer system

90
Q

Trends in hardware

A

becoming smaller, faster, cheaper, and more powerful over time

91
Q

What does hardware consist of?

A

Central processing unit (CPU): manipulates the data and controls the tasks performed by the other components
primary storage: temporarily stores the data and program instructions during processing
secondary storage: stores data and programs for future use
input technologies: accept data and instructions and convert them to a form that the computer can understand
output technologies: present data and information in a form people can understand
communication technologies: provide for the flow of data from external computer networks to the CPU, and from the CPU to computer networks

92
Q

Mainframes, microcomputers, and laptops

A

mainframes: remain popular in large enterprises for extensive computing applications that are accessed by thousands of users at one time (airline reservations)
microcomputers: personal computers, smallest and least expensive category of general-purpose computers
laptop computers: small, easily transportable, lightweight microcomputers that fit comfortably into a briefcase

93
Q

Supercomputers

A

does not refer to a specific technology, indicates the fastest computers available at any given time

94
Q

thin client vs. fat client

A

thin: computer that does not offer the full functionality of a PC
fat: computer that has the ability to perform many functions without a network connection

95
Q

Types of input devices

A

human data-entry: require certain amount of human effort to input data (gesture recognition)
source-data automation: devices input data with minimal human intervention (barcode readers)

96
Q

Output technologies

A

output generated by a computer can be transmitted to the user through several output devices and media (monitors, printer, plotters, and voice)

97
Q

CPU

A

performs the actual computation or “number crunching: inside any computer, it is a microprocessor aka a “chip”

98
Q

Primary vs. secondary storage

A

primary: stores small amounts of data and information that the CPU will use immediately
secondary: which stores much larger amounts of data and information

99
Q

Byte

A

eight-bit string processed by CPUs

100
Q

Three types of information for primary storage

A
  1. data to be processed by the CPU
  2. instructions for the CPU as to how to process the data
  3. operating system programs that manage various aspects of the computer’s operation
101
Q

Types of primary storage

A

register: least capacity, storing extremely limited amounts of instructions and data only immediately before and after processing , cache memory: type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory , random access memory: part of primary storage that holds a software program and small amounts of data of processing, and read-only memory: nonvolatile, retain instructions when the power to the computer is turned off

102
Q

Characteristics of secondary storage

A

nonvolatile, takes more time to retrieve data from it than from RAM, cheaper than primary storage, use a variety of media, each with its own technology

103
Q

Types of secondary storage

A

Magnetic tape: kept on a large open reel or in a smaller cartridge or cassette, cheap yet hold lots of data
Magnetic disks most common due to low cost, high speed, and large storage capacity , solid-state drives: storage devices that serve the same purpose as a hard drive and store data in memory chips, optical storage devices: do not store data through magnetism rather laser reads the surface of a reflective plastic platter

104
Q

Software

A

computer hardware is only as effective as the instructions you give it, contained in the software

105
Q

Computer programs

A

sequences of instructions for the computer; process of writing, to coding, programs is called programming

106
Q

Two type of software

A

systems software and application software

107
Q

Software issues

A

software defects, software licensing, open systems (group of computing products that work together), open-source software (proprietary software: purchased software that has restrictions on its use, copying, and modification)

108
Q

Systems software

A

set of instructions that serves primarily as an intermediary between computer hardware and application programs

109
Q

Operating system

A

the “director” of your computer system’s operations. Supervises the overall operation of the computer by monitoring the computer’s status, scheduling operations, and managing input and output processes

110
Q

Graphical user interface

A

GUI: allows users to directly control the hardware by manipulating visible objects (such as icons) and actions that replace complex commands

111
Q

Social interface

A

guides user through computer applications by using cartoon-like characters, animation, and voice commands

112
Q

application software

A

set of computer instructions that provides specific functionality to a user ex. general word processing, or narrow, such as an organization’s payroll program

113
Q

package/software suite

A

group of programs with integrated functions that has been developed by a Endor and is available for purchase in a prepackaged form

114
Q

Personal application software

A

help individual users increase their productivity

115
Q

Speech-recognition software

A

input technology, rather than strictly an application, that enables users to provide input to systems software and application software

116
Q

General functions of the operating system

A

manage actual computer resources, schedule/process applications, manage/protect memory, manage input and output functions/hardware

117
Q

Major types of application software

A

spreadsheet, data management, word processing, desktop publishing, graphics, multimedia, communications, speech recognition, and groupware