Information Systems for Business and Beyond Flashcards
the head of the information systems function and aligns the plans and operations of the information systems with the strategic goals of the function.
CIO: Chief Information Officer
Person in charge of setting information system policies for an organization, and then overseeing the implementation of those policies.
Information Security Officer:
the person who plans, develops, monitors and maintains databases that are used as part of applications or the data
warehouse.
Database Administrator:
A collection of facts, that is intangible.
Data
Processed data that possess context, relevance, and purpose.
Information:
Technology, people, and processes that allow us to take and transform meaningless data into useful information for decision making.
Information System (IS):
A subset, or one component of information systems that allow us to take and transform meaningless data into
useful information for decision making.
Information Technology (IT):
human beliefs or perceptions about relationships among facts or concepts relevant to that area.
Knowledge:
when a person can combine their knowledge and experience to produce a deeper understanding of a topic.(
Wisdom:
when a company successfully attracts more customers, earns more profit, or returns more value to its shareholders than rival firms do.
Competitive Advantage:
strategy where a firm offers customers its product or service at a lower price than its rivals can.
Example: Walmart
Cost Leadership:
strategy where a company tries to add value to their products and services so they can attract customers who are willing to pay a higher price.
Differentiation:
obstacles that make it difficult to enter a given market.
Entry Barrier:
strategy whereby a firm chooses to add value or lower costs for a smaller market.
Focus Strategy:
a plan to achieve advancements in technology or service by investing in research and development activities to meet previously unmet needs of buyers or meet their needs in a new way.
Innovation Strategy:
refers to performing the same operational tasks better than rivals perform them.
Operational effectiveness:
A framework to determine the profitability and attractiveness of a market:
- Industry Rivalry
- Bargaining Power of Buyers
- Bargaining Power of Suppliers
- Threat of New Entrants
- Threat of Substitute Products
Porter’s 5 Force Model:
refers to performing different activities from those of rivals, or the same activities in a different way.
Strategic positioning:
A set of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.
Value Chain:
continuous and can be represented by smooth wave pattern.
Analog signals:
base-2 numeral system, which represents numeric values using two different symbols: 0 and 1.
Binary:
The smallest unit of data in a computer represented by one or zero.
Bit:
The electrical connection between different computer components that is an important determiner of the computer’s speed.
Bus:
A unit of data that computers use to represent a character such as a letter, number, or typographic symbol with a group of eight bits.
Byte:
The “brains” of the device, carries out the commands sent to it by the software and returns results to be acted
upon.
Central Processing Unit (CPU):
Where data is stored when the computer is turned off and where it is retrieved from when the computer is turned on.
Hard Disk:
A measure of computer processing speed.
Hertz:
states that the number of transistors on a microchip double about every two years, resulting in the cost being halved.
Moore’s Law:
The working, volatile memory that begins to load information from the hard disk as the computer starts up.
Random Access Memory (RAM):
non-volatile memory that permanently stores instructions for your computer.
Read Only Memory:
using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local
server or a personal computer. (4.3)
Cloud Computing:
Managing a company’s interactions with current and future customers. Often using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support.
Customer Relationship Management (CRM):
Stores and retrieves the data that an application creates and uses.
Database Management System (DBMS):
A software application utilizing a central database that is implemented throughout the entire organization.
Enterprise Resources Planning (ERP):
a version of the Unix operating system that runs on a personal computer and is used primarily by scientists and engineers.
LINUX:
software that is rented rather than purchased. It is subscription-based.
Software as a service (SaaS):
one instance of a set of fields in a table.
Record:
Consistency among the stored data.
Data Integrity:
The structure and organization of data in a database
Data Hierarchy:
The use of a programming language to modify data in a database to make it easier to view or for the purpose of decision-making.
Database Manipulation:
the logical structure of the data items and their relationships.
Data Model:
shows the relationships among the tables of data when a database is being designed.
Entity Relationship Diagram (ERD):
contains only one file/table, with no relationships. A table created in a spreadsheet would be considered a flat file.
Flat File Database:
to design a database in a way that reduces data redundancy; and ensures data integrity.
Normalization:
A graphical query tool, to retrieve data though visualized commands.
Query-by-Example (QBE):
the rows of the table.
Record:
data that is repeated in a database, which can cause the data set to be inconsistent.
Redundant Data:
Developed to provide an overall description of the database.
Schema:
The most common language for creating and manipulating databases. SQL inhabiting everything from
desktop software, to high-powered enterprise products.
Structured Query Language (SQL):
An early packet switching network that was originally developed by the US Department of Defense.
ARPANET (Advanced Research Projects Agency Network):
A network device that connects two networks together and only allows packets through that are needed.
Bridge:
acts as a directory on the Internet when a request to access a device with a domain name is given.
Domain Name System (DNS):
A descriptive text followed by the top level domain that is human friendly name for a device on the internet.
Domain Name:
the end of the domain name that indicates type of organization, such as .com, .org, .net, .edu…etc.
Domain Name Extension:
An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet
securely.
Extranet:
ISP
Internet Service Provider
A local or restricted communications network
Intranet:
A unique identifying number assigned to every device that communicates on the internet.
IP Address:
network that connects computers and other devices in a relatively small area, typically a single building or a
group of buildings.
LAN: Local Area Network
Spans a larger area like a city or region
Metropolitan Area Network (MAN):
large network that connects computers at different
sites via telecommunications media such as phone lines, satellites, and microwaves
wide area network (WAN)
Converts the format of the data so it may be transmitted between computers.
Modem:
The fundamental unit of data transmitted over the internet. Each packet includes the sender’s address, the destination address, a sequence number and piece of the overall message to be sent.
Packet:
When a packet is passed from one router to another across the Internet until it reaches its destination.
Packet Switching:
A specific set of communication rules used by computers.
Protocol:
A device that receives and analyzes packets and then routes them towards their destination.
Router:
Manages network resources or performs special tasks such as storing files, managing one or more printers, or processing database queries.
Server:
Defines how electronic devices should be connected over the Internet, and how data should be transmitted between them.
TCP/IP: Transmission Control Protocol / Internet Protocol.
A method employing encryption to provide secure access to a remote computer over the Internet.
VPN: Virtual Private Network
Refers to systems in which non-programmers can create working applications.
End-User Computing:
The old and new system are used simultaneously for a limited period of time.
Implementation Methodology – Parallel Operation:
The organization selects a particular date that the old system is not going to be used. On that date, the old system is turned off and the new one is operational.
Implementation Methodology – Direct Cutover :
Different functions of the new application are implemented in phases, adding functionality as the phases are implemented.
Implementation Methodology – Phased Implementation:
A subset of the organization starts using the new system before the rest of the organization.
Implementation Methodology – Pilot Implementation:
A methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops
Joint Application Development :
A methodology that focuses on taking an initial idea and developing a minimum viable product
Lean Methodology:
A working software application with just enough functionality to demonstrate the idea behind the project.
Minimum Viable Product (MVP):
A model that illustrates the constraints of project management: time, cost, and quality. A manager cannot change one of the constraints without impacting the others.
Quality Triangle:
A development methodology that focuses on quickly building a working model of the software, getting feedback from users, and then using that feedback to update the working model.
Rapid Application Development:
- Preliminary Analysis
- Systems Analysis
- Systems Design
- Programming
- Testing
- Implementation
- Maintenance
Systems Development Life Cycle :
To ensure that the user can only access the information resources that are appropriate. It determines which users are authorized to read, modify, add, and/or delete information.
Access Control:
a set of rules applied by the owner, creator or administrator of a
network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be
used.
Acceptable Use Policies (AUP):
A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.
Example: a fingerprint scan.
Biometric Authentication:
Attack does exactly what the term suggests: it prevents a web server from servicing authorized users.
Denial-of-Service (DoS):
Works to provide the functionality to identify if the network is being attacked.
Intrusion Detection System (IDS):
a method of restricting network access based on the roles of individual users within an enterprise.
Role-based access control (RBAC):
when criminals lure individuals into sending them personal, confidential data that can be used in crime.
Social Engineering:
A device that provides battery backup to critical components of the system, allowing the system to stay online longer and/or allowing the IT Staff to shut them down using proper procedures in order to prevent the data loss that might occur from power failure.
Universal Power Supply (UPS):
allows users who are outside of a corporate network to take a detour around the firewall and access the internal
network from the outside.
VPN: A virtual private network
The gap between demographics and regions that have access to modern information and communications technology, and those that don’t or have restricted access.
Digital Divide:
tokenize digital files by creating a digital certificate on the blockchain so that they are unique and owned and cannot be reproduced like other digital files.
Non-fungible Tokens (NFT’s):
Small files sent by websites to users’ computers, usually without knowledge or specific consent. Can be used to personalize a website, remember users’ preferences, and retain products in electronic shopping carts.
Website Cookies:
A peer-to-peer network which provides an open, distributed record of transactions between two parties.
Blockchain:
Stores information on a server, which allows internet users to visit a company’s site and view all of the content.
Hosting:
When a group of computers are linked together with equal permissions and responsibilities for processing data.
peer-to-peer (P2P) networking:
where data is collected over some time period and processed together.
Batch Processing
A systematic approach to making an organization’s workflow more effective, more efficient and more capable of adapting to an ever changing environment.
Business Process Management (BPM):
All data in an ERP system is stored in a single, central database. Data entered
in one part of the company can be immediately available to other parts of the company.
Centralized Database:
a technology for managing all your company’s relationships and interactions with customers and potential customers
Customer Relationship Management (CRM):
the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.
Electronic Data Interchange (EDI):
A business process management program that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.
Enterprise Resources Planning (ERP):
Extracts data from a database to compile reports, such as sales analysis, inventory-level reports, and financial statements, to help managers make routine decisions.
Management Information System:
System that handles the interconnection between inventory of the products in their various stages of development.
Supply Chain Management (SCM):
a system that collects, modifies and retrieves business transaction data.
Transaction Processing System (TPS):
allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly
AD Hoc Reporting Tools:
three V’s: Volume (size), Variety (# of data types), and Velocity (processing speed).
Big Data categorizations:
Describes the process that organizations take to collect and analyze data in the hopes of obtaining a competitive advantage.
Business Intelligence:
Provide regular summaries of information in a predetermined format. They’re often developed by information systems staff and formats can be difficult to alter.
Canned Reports:
The commitment by an organization to ensuring data and information meet the characteristics of being valuable in order for the organization to meet its objectives.
Data Governance:
The process of analyzing data to find previously unknown and interesting trends, patterns, and associations in order to make decisions.
Data Mining:
Type of data visualization that provide a heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics.
Dashboards:
Customized for executives. These systems provide specific information for strategic decisions.
Executive Information System (EIS):
Are outdated information systems that were not designed to share data, aren’t compatible with newer technologies, and aren’t aligned with the organization’s current business needs.
Legacy Systems:
Enhances one’s view of the real world with layers of digital information added to it.
Augmented reality (AR):
A process that replicates the working mechanism of the human brain in data processing and also creates patterns for decision making.
Deep Learning (DL):
computer system emulating the decision-making ability of a human expert.
Expert Systems (ES):
is an umbrella term that covers all forms and combinations of real and virtual environments.
This includes: augmented reality (AR), virtual reality (VR) and a combination of the two or mixed reality (MR).
Extended Reality (XR)
physical objects being connected to the Internet, embedded with electronics, software, sensors, and network
connectivity, which enables these objects to collect and exchange data.
Internet of Things (IoT):
Uses data and algorithms to imitate the way humans learn. Machine learning is used to analyze data and build models without being explicitly programmed to do so.
Machine Learning (ML):
Allows computers to read, decipher and extract meaning from human language.
Natural Language Processing (NLP):
Computer interaction in which a real or imagined environment is simulated.
Virtual Reality (VR):
the ability of the database to allow multiple users access to the same record without adversely affecting transaction processing
concurrency:
a record within a table
instance:
a database management system in which information is represented in
the form of objects
object-oriented data model:
a technical term for row or record
tuple:
employee identification
EID:
as the building blocks of a database
independent entity or kernel:
shows the database development process as a strict sequence of steps where the output of one step is the input to the next
waterfall model:
English-like statements used to convey the steps of an algorithm or function.
pseudocode
Symbol used in flowcharting for asking a question and making a decision.
Decision symbol = A Diamond
A programming design tool that uses graphical elements to visually depict the flow of logic within a function.
flowcharting
Symbol used in flowcharting for input/output interactions.
Input/Output Symbol = A Parallelogram
Symbol used in flowcharting for normal processes such as assignment.
Process Symbol = A Rectangle
Converts source code to object code.
Compiler
(In Programming) Copy revisions from the current repository to a remote repository.
Push
(In Programming) Copy revisions from a remote repository to the current repository.
Pull
(In Programming) A data item whose value cannot change during the program’s execution.
constant
(In Programming) A data item whose value cannot change during the program’s execution.
constant
(In Programming) A data item whose value can change during the program’s execution.
variable
American Standard Code for Information Interchange
ASCII
Reserved word used to indicate a non-numeric value in a numeric variable.
NaN
Reserved word used to represent a missing value or invalid value.
null
The fractional part of a floating-point data type that is dropped when converted to an integer.
truncation
A part of the computer’s memory used for storage of data.
stack
Combining two strings into one string.
concatenation
a technique, which is used for the dissemination of information, articles, etc
Really Simple Syndication (RSS)
A network management protocol that dynamically assigns IP addresses to devices on a network.
Dynamic Host Configuration Protocol (DHCP)
A network protocol used to transfer files over the Internet.
File Transfer Protocol (FTP)
A network node, or router, that connects two networks using different transmission protocols together.
Gateway
The process that establishes communication between two networking devices.
Handshake
The underlying protocol that is used by the World Wide Web which defines how messages are formatted and transmitted.
Hypertext Transfer Protocol (HTTP)
An organization that provides services for accessing the Internet
Internet Service Provider (ISP)
A unique identifier assigned to a piece of network hardware by the manufacturer.
Media Access Control Address (MAC Address)
A file storage system that is connected to a network, allowing multiple devices access at the same time.
Network Attached Storage (NAS)
A connection point for data transmissions over a network.
Node
A formatted unit of data which consists of control information and user data.
Packet
A utility used to test whether a device on a network can be contacted.
Ping
A feature of some routers and switches that prioritizes particular network traffic.
Quality of Service (QoS)
A piece of networking hardware that is used to connect a local network to the Internet via a Modem and forwards packets of data between networks.
Router
A secure method for remote login from one computer to another.
Secure Shell (SSH)
A piece of networking hardware that expands the number of network ports available and is used to connect devices on a network.
Switch
The address, or location, of a webpage on the Internet.
Uniform Resource Locator (URL)
A network security standard used to create a secure wireless home network.
Wi-Fi Protected Setup (WPS)
A malicious application or script that can be used to take advantage of a computer’s vulnerability.
Exploit
The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Breach
An umbrella term that describes all forms of software designed to wreak havoc on a computer.
Malware
A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
Virus
A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
Ransomware
A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
Trojan horse
A piece of malware that can replicate itself in order to spread the infection to other connected computers
Worm
A type of malware that functions by seeing user activity without their knowledge. Such as activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Spyware
malware that allows cybercriminals to remotely control your computer.
Rootkit
Acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
DDoS
this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Penetration Testing
An audio or video clip that has been edited and manipulated to seem real or believable.
Deepfake
refers to the innovation that transforms expensive or highly sophisticated products or services—previously accessible to a high-end or more-skilled segment of consumers—to those that are more affordable and accessible to a broader population.
Disruptive Innovation