Information Systems EXAM Flashcards

1
Q

Strategic Business objectives of information systems

A
  1. operational excellence
  2. new products, services & business models
  3. customer supplier intimacy
  4. improved decision making
  5. competitive advantage
  6. survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business processes

A

The manner in which work is organized, coordinated, and focused to produce a valuable product or service. May be assets or liabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enterprise systems

A

Collect data from different functions and store data in a single central database. Resolve problem of fragmented, redundant data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supply chain management systems

A

Manage the firm’s relationships with suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Customer relationship management systems

A

Provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT governance

A

Strategies and policies for using IT in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agency theory

A

The firm is a nexus of contracts among self-interested parties requiring supervision. It can reduce agency costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Postindustrial organizations

A

Organizations flatten because in postindustrial societies, authority relies on knowledge and competence rather than formal positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five competitive forces

A

Traditional competitors
new market entrants
substitutes
customers
suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IS strategies for dealing with competitive forces

A

low-cost leadership
differentiation
focus on market niche
strengthen customer and supplier intimacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Value Chain Model

A

The firm is viewed as a series of activities that add value to products or services. Includes primary and support activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The value web

A

A firm’s value chain is linked to the value chain of its suppliers, distributors, and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Ecosystem

A

Industry sets of firms providing services/products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keystone firms

A

Dominate the ecosystem and create platforms used by other firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Niche firms

A

Rely on platforms developed by keystone firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Individual firms

A

Consider how IT will enable them to become profitable niche players in larger ecosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Metcalfe’s law and network economics

A

The value of a network grows exponentially as a function of the number of network members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Scalability

A

Ability to expand to serve larger number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data redundancy

A

The presence of duplicate data in multiple data files so that the same data is stored in more than one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data inconsistency

A

The same attribute may have different values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Relational DBMS

A

Represents data as two-dimensional tables called relations and relates data across tables based on common data elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Operations of a relational DBMS

A

Select: creates a subset of rows that meet specific criteria
Join: combines relational tables to provide users with information
Project: enables users to create new tables containing only relevant information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data warehouse

A

stores current and historical data from many core operational transaction systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data marts

A

Subset of the data warehouse. Summarized or highly focused portion of firm’s data for use by specific population of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Data mining
Tools for analyzing large pools of data. Find hidden patterns and infer rules to predict trends
26
Text mining
extracts key elements from large unstructured data sets
27
Web mining
The discovery and analysis of useful patterns and information from the world wide web
28
Sentiment analysis
Mines text comments in an email message, blog, social media conversation or survey to detect favourable and unfavourable opinions
29
Data quality audit
Structured survey of the accuracy and completeness of data in an information system
30
Data cleansing
Consists of activities for detecting and correcting data in an IS
31
Client/server computing
Distributed computing model. Clients are linked though network controlled by network server computer. The internet is the largest implementation of client/server computing/
32
Protocols
Rules that govern the transmission of information between two points
33
Hypertext transfer protocol
Communications standard used for transferring web pages
34
Radio Frequency Identification (RFID)
Uses tiny tags with embedded microchips containing data about an item and location, and antenna
35
Security
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to IS
36
Controls
Methods, policies, and organizational procedures that ensure safety of organization's assets & operational adherence to management standards
37
Computer viruses
Rogue software programs that attach to other programs in order to be executed, usually without user knowledge or permission
38
Worms
Programs that copy themselves from one computer to another over networks
39
Trojan Horse
A software program that appears to be benign but then does something unexpected. Often transports a virus into a computer system
40
SQL injection attacks
Hackers submit data to web forms that exploits site's unprotected software and sends rogue SQL query to database
41
Spyware
Keylogging records keystroked made on a keyboard, can steal passwords etc.
42
Spoofing
masquerading as someone else or redirecting a web link to an unintended address
43
Sniffing
an eavesdropping program that monitors information travelling over a network
44
Social engineering
Tricking employees into revealing their passwords
45
Business continuity planning
Focuses on how the company can restore business operations after a disaster strikes
46
Public key encryption
Uses two different keys, one private and one public which are mathematically related so that data encrypted with one key can be decrypted using the other
47
Enterprise Systems
Suite of integrated software modules and a common central database
48
Supply chain
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products and distributing the finished products to customers
49
Bullwhip effect
Information about product demand gets distorted as it passes from one entity to next across supply chain
50
Pushed-based supply chains
Production master schedules are based on forecasts or best guesses of demand and products are pushed to customers
51
Pull-based supply chains
aka demand-driven or build-to-order model. Actual customer orders trigger events in the supply chain
52
Business value of SCM systems
match supply to demand reduce inventory levels improve delivery service speed product time to market use assets more effectively reduced supply chain costs increased sales
53
Touch point
A method of interaction with the customer
54
Operational CRM
Customer-facing applications such as a call centre and customer service support
55
Analytical CRM
Based on data warehouses that consolidate the data for analysis
56
Churn rate
Number of customers who stop using or purchasing products or services from a company
57
E-commerce revenue models
Advertising sales subscription free/freemium transaction fee affiliate
58
Four main global strategies
domestic exporter multinational franchisers transnational
59
Three main kinds of organizational structure
centralized in the home country Decentralized/ dispersed to local foreign units Coordinated- all units are equals
60
Four main types of systems configuration
Centralized duplicated (development at home base, operations foreign) decentralized (each foreign unit designs own systems) Networked (development + operations occur in coordinated fashion across all units)