Information Systems EXAM Flashcards

1
Q

Strategic Business objectives of information systems

A
  1. operational excellence
  2. new products, services & business models
  3. customer supplier intimacy
  4. improved decision making
  5. competitive advantage
  6. survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business processes

A

The manner in which work is organized, coordinated, and focused to produce a valuable product or service. May be assets or liabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enterprise systems

A

Collect data from different functions and store data in a single central database. Resolve problem of fragmented, redundant data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supply chain management systems

A

Manage the firm’s relationships with suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Customer relationship management systems

A

Provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT governance

A

Strategies and policies for using IT in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agency theory

A

The firm is a nexus of contracts among self-interested parties requiring supervision. It can reduce agency costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Postindustrial organizations

A

Organizations flatten because in postindustrial societies, authority relies on knowledge and competence rather than formal positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five competitive forces

A

Traditional competitors
new market entrants
substitutes
customers
suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IS strategies for dealing with competitive forces

A

low-cost leadership
differentiation
focus on market niche
strengthen customer and supplier intimacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Value Chain Model

A

The firm is viewed as a series of activities that add value to products or services. Includes primary and support activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The value web

A

A firm’s value chain is linked to the value chain of its suppliers, distributors, and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Ecosystem

A

Industry sets of firms providing services/products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keystone firms

A

Dominate the ecosystem and create platforms used by other firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Niche firms

A

Rely on platforms developed by keystone firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Individual firms

A

Consider how IT will enable them to become profitable niche players in larger ecosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Metcalfe’s law and network economics

A

The value of a network grows exponentially as a function of the number of network members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Scalability

A

Ability to expand to serve larger number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data redundancy

A

The presence of duplicate data in multiple data files so that the same data is stored in more than one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data inconsistency

A

The same attribute may have different values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Relational DBMS

A

Represents data as two-dimensional tables called relations and relates data across tables based on common data elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Operations of a relational DBMS

A

Select: creates a subset of rows that meet specific criteria
Join: combines relational tables to provide users with information
Project: enables users to create new tables containing only relevant information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data warehouse

A

stores current and historical data from many core operational transaction systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data marts

A

Subset of the data warehouse. Summarized or highly focused portion of firm’s data for use by specific population of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data mining

A

Tools for analyzing large pools of data. Find hidden patterns and infer rules to predict trends

26
Q

Text mining

A

extracts key elements from large unstructured data sets

27
Q

Web mining

A

The discovery and analysis of useful patterns and information from the world wide web

28
Q

Sentiment analysis

A

Mines text comments in an email message, blog, social media conversation or survey to detect favourable and unfavourable opinions

29
Q

Data quality audit

A

Structured survey of the accuracy and completeness of data in an information system

30
Q

Data cleansing

A

Consists of activities for detecting and correcting data in an IS

31
Q

Client/server computing

A

Distributed computing model. Clients are linked though network controlled by network server computer. The internet is the largest implementation of client/server computing/

32
Q

Protocols

A

Rules that govern the transmission of information between two points

33
Q

Hypertext transfer protocol

A

Communications standard used for transferring web pages

34
Q

Radio Frequency Identification (RFID)

A

Uses tiny tags with embedded microchips containing data about an item and location, and antenna

35
Q

Security

A

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to IS

36
Q

Controls

A

Methods, policies, and organizational procedures that ensure safety of organization’s assets & operational adherence to management standards

37
Q

Computer viruses

A

Rogue software programs that attach to other programs in order to be executed, usually without user knowledge or permission

38
Q

Worms

A

Programs that copy themselves from one computer to another over networks

39
Q

Trojan Horse

A

A software program that appears to be benign but then does something unexpected. Often transports a virus into a computer system

40
Q

SQL injection attacks

A

Hackers submit data to web forms that exploits site’s unprotected software and sends rogue SQL query to database

41
Q

Spyware

A

Keylogging records keystroked made on a keyboard, can steal passwords etc.

42
Q

Spoofing

A

masquerading as someone else or redirecting a web link to an unintended address

43
Q

Sniffing

A

an eavesdropping program that monitors information travelling over a network

44
Q

Social engineering

A

Tricking employees into revealing their passwords

45
Q

Business continuity planning

A

Focuses on how the company can restore business operations after a disaster strikes

46
Q

Public key encryption

A

Uses two different keys, one private and one public which are mathematically related so that data encrypted with one key can be decrypted using the other

47
Q

Enterprise Systems

A

Suite of integrated software modules and a common central database

48
Q

Supply chain

A

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products and distributing the finished products to customers

49
Q

Bullwhip effect

A

Information about product demand gets distorted as it passes from one entity to next across supply chain

50
Q

Pushed-based supply chains

A

Production master schedules are based on forecasts or best guesses of demand and products are pushed to customers

51
Q

Pull-based supply chains

A

aka demand-driven or build-to-order model. Actual customer orders trigger events in the supply chain

52
Q

Business value of SCM systems

A

match supply to demand
reduce inventory levels
improve delivery service
speed product time to market
use assets more effectively
reduced supply chain costs
increased sales

53
Q

Touch point

A

A method of interaction with the customer

54
Q

Operational CRM

A

Customer-facing applications such as a call centre and customer service support

55
Q

Analytical CRM

A

Based on data warehouses that consolidate the data for analysis

56
Q

Churn rate

A

Number of customers who stop using or purchasing products or services from a company

57
Q

E-commerce revenue models

A

Advertising
sales
subscription
free/freemium
transaction fee
affiliate

58
Q

Four main global strategies

A

domestic exporter
multinational
franchisers
transnational

59
Q

Three main kinds of organizational structure

A

centralized in the home country
Decentralized/ dispersed to local foreign units
Coordinated- all units are equals

60
Q

Four main types of systems configuration

A

Centralized
duplicated (development at home base, operations foreign)
decentralized (each foreign unit designs own systems)
Networked (development + operations occur in coordinated fashion across all units)