IT Management Flashcards

1
Q

Describe the information age

A

infinite quantities of facts are widely available to anyone who can use a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information age and the differences among data,

A

structured and unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

information age and the difference among information,

A

The simple difference between data and information is that computers or machines need data and humans need information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is business intelligence

A

information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is knowledge

A

includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the different departments in a company and why they must work together to achieve success.

A

accounting, finance, HR, marketing, Ops Mgmt, Sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain systems thinking and how management information systems enable business communications

A

A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. Feedback is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter’s actions. Feedback helps the system maintain stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the primary MIS roles along with their associated responsibilities

A

CIO, oversees and ensures strategic alignment, CKO, collecting and maintaining orgs knowledge. CPO-ethical and legal use of info
cso-security of MIS systems, and CTO speed, accuracy, availability and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define critical success factors (CSFs) and key performance indicators (KPIs) and explain how managers use them to measure the success of MIS projects.

A

CSF-high quality products, competitive advantage, reduce product costs, increase cs satisfaction, hire and retain employees
KPI- metrics used for # of product returns, new cs. turnover rates and avg. customer spending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why a business would use metrics to measure the success of strategic initiatives.

A

they can view SCM, CRM, BPR and ERP metrics which helps make strategic decisions for future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the three common business forms

A

sole proprietorship
partnership
corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List and describe the seven departments commonly found in most organizations

A

hr, sales, marketing, Operations, Business, accounting, Finance,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe business processes and their importance to an organization

A

3 steps: measure, monitor, and assign. it at minimum doubles the gains of a project by increasing efficiency, compliance, standardization and agility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare the continuous process improvement model and business process reengineering

A

BPR - analysis and redesign of workflow within and between enterprises
Continuous - attempts to understand and measure the current process, and make performance improvements accordingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the importance of business process modeling (or mapping) and business process models

A

creating either a detailed flow chart, process map, or a graphic description of process showing inputs, tasks, activities in sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain business process management along with the reason for its importance to an organization

A

BPM allows business process to be executed more efficiently and measures performance and identifies opportunities. reduces overhead,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is RAM

A

computers primary working memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is ROM

A

Read only memory, portion of the primary storage that does not lose its contents when the computer is turned off (ex. memory card, memory stick)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

magnetic tape

A

older secondary storage that uses a thin strip of plastic coated with mag sensitivity recording

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a hard drive

A

secondary storage uses discs coated with magnetically sensitive material and housed together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are optical mediums

A

CD-ROM, CD-RW, DVD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explain MIS infrastructure and its three primary types

A

Includes the plans for how a firm will build, deploy, use, and share its data. Information (support ops), agile (supports change) and sustainable(supports environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify the three primary areas associated with an information MIS infrastructure

A

Backup and recovery plan
Disaster recovery plan
Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the characteristics of an agile MIS infrastructure

A
Accessibility
Availability
Maintainability
Portability
Reliability
Scalability
Usability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

describe 3 types of networks

A

LAN, WAN, MAN
local, wide, metropolitan
local - within a building, Wide within the country, metropolitian, within a city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is TCP / IP

A

transmission control protocol/ internet protocol provides technical foundation for the public internet as well as priv networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe the relationship between information security policies and an information security plan

A

Information security policies are developed for people to combat insider issues. by creating a policy you create a plan for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response

A

Authentication & authorization: user id & Pass
Prevention & Resistance: firewalls, encryption
Detection & Response: intrusion detection software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Identify the six policies an organization should implement to protect themselves

A

Ethical computer use, email privacy policy, information privacy policy, social media policy, acceptable use policy, workplace monitoring policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Explain operations management role in business

A

forcasting, ops mgmt, scheduling, capacity planning, inventory, quality, training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Identify the environmental impacts associated with MIS

A

increased electronic waste, increased energy consumption, increased carbon emissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe the five characteristics of competitive priorities

A

cost, quality, delivery, flexibility, service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Explain the three components of a sustainable MIS infrastructures along with their business benefits

A

grid computing: computers georgraphically dispersed coordinated to solve problem. cloud computing single instance of a system serves mutliple customers. virtualized computing: creates multiple virtual machines on a single compuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Compare tactical, operational, and strategic BI

A

daily, short term, long term. users for ops is managers, analysts. execs and mgr for tactical and strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Describe the four categories of BI business benefits

A

Quantifiable benefits
Indirectly quantifiable benefits
Unpredictable benefits
Intangible benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Explain the cultural, political, and geoeconomic challenges facing global businesses

A

cultural: language, religion customs etc. Political: Tax, import/export rules, trade agreements. Geoeconomic effects of georgraphic regions on business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe the four global IT business drivers that should be included in all IT strategies

A

Nature of the industry, competitive factors, enviromental factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Describe governance and compliance and the associated frameworks an organization can implement

A

governance-method or system of gov’t for mgmt or control. Compliance is yielding or conforming. CoBit: IS audit & Control, ITIL: IT Infras library COSO: comittoee of sponsoring orgs CMMI: Capability maturity model integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Identify why an organization would need to understand global enterprise architectures when expanding operations abroad

A

includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Explain the many different global information issues an organization might encounter as it conducts business abroad

A

authentication, access control, encryption. regulatory issues, technology and country orientated issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Identify global system development issues organizations should understand before building a global system

A

country dev systems into global dev systems. multinational dev teams, centers of excellence, outsource dev work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Explain why businesses use trends to assess the future

A

emerging trends and new technologies as they relate to business can help an organization anticipate and prepare for the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Identify the global trends that will have the greatest impact on future business

A

World’s population will double in the next 40 years
People in developed countries are living longer
Growth in information industries is creating a knowledge-dependent global society
The global economy is becoming more integrated
The economy and society are dominated by technology
Pace of technological innovation is increasing
Time is becoming one of the most precious commodities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Identify the technologies that will have the greatest impact on future business

A

new technologies, automation and demand for scientists, engineers and technicians will continue to grow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Describe the information age and the differences between data, information, business intelligence, and knowledge

A

The present time, during which infinite quantities of facts are widely available to anyone who can use a computer.

46
Q

Identify the different departments in a company and why they must work together to achieve success

A

accounting, finance, hr, marketing, ops mgmt, sales

47
Q

Explain systems thinking and how management information systems enable business communications

A

Systems thinking – A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

48
Q

what is MIS

A

management information systems. business function like accounting and HR which moves information about people products and processes across the company to facilitate decision making

49
Q

Explain why competitive advantages are temporary along with y the four key areas of a SWOT analysis

A

temporary because it’s based on current time that the customer places greater value on then similar offerings. SWOT is also current.

50
Q

Describe Porter’s Five Forces Model and explain each of the five forces

A

supplier power:power to drive up prices of materials. threats of new entrants: power of competitors to enter a market. buyer power: power of cs to drive down prices. threat of substitute products & services: power of cust to purchase alternatives

51
Q

Compare Porter’s three generic strategies

A

cost leadership, differentiation, focused strategy

52
Q

Demonstrate how a company can add value by using Porter’s value chain analysis

A

firm infras, HR mgmt, Tech development, procurement

53
Q

Identify how an organization can use business process reengineering to improve its business

A

creates a set of standard activities that accomplish a specific task such as processing customers orders

54
Q

Explain supply chain management and its role in business

A

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness & profitability

55
Q

Explain customer relationship management systems and how they can help organizations understand their customers

A

Identify types of customers
Design individual customer marketing campaigns
Treat each customer as an individual
Understand customer buying behaviors

56
Q

Summarize the importance of enterprise resource planning systems

A

integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations

57
Q

Explain information ethics and its associated issues

A

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. issues could be IP, Copyright, pirated software, counterfeit

58
Q

Describe information security and the difference between hackers and viruses.

A

hacker is a person, experts break into computers and networks for profit or just motivation. Viruses are software that is written with malicious intent to cause annoyance or damage.

59
Q

Explain the four primary traits that determine the value of information

A

collecting, compiling, sorting, and analyzing information.

60
Q

Describe a database, and the relational database model

A

Database – maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)

61
Q

Identify the business advantages of a relational database

A

increased flexibility, scalability, performance, information integrity and security. Reduction information redundance.

62
Q

Explain the business benefits of a data-driven website

A

easy to manage content, store large amts of data and eliminate human errors

63
Q

Explain why organizations would want to integrate databases

A

elimates needs for manual entry. allows seperate systems to communicate directly with eachother

64
Q

what is Database management systems (DBMS) –

A

Allows users to create, read, update, and delete data in a relational database

65
Q

what is a data mart

A

contains subset of data warehouse information.

66
Q

what is ETL

A

Extraction, tranformation and loading. Process that extracts information from Internal and external databases, transforms the information using a common set of definitions.

67
Q

What are the 4 common charecteristics of Big Data

A

variety, veracity, volume, velocity

68
Q

Explain data mining and identify the three elements of data mining

A

process of analyzing data to extract information not offered by the raw data alone

69
Q

Explain the importance of data analytics and data visualization

A
Info graphics
Data artist
Analysis paralysis 
Data visualization 
Business intelligence dashboards
70
Q

what is AI

A

Artificial intelligence (AI) – Simulates human intelligence such as the ability to reason and learn

71
Q

what is the 5 categories of AI

A

Expert system, neural network, genetic algorithm, intelligent agent, virtual reality

72
Q

Describe supply chain management along with its impact on business

A

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability

73
Q

Identify the three technologies that are reinventing the supply chain

A

3d printing, RFI (radio frequency ID), Drones and robotics

74
Q

Describe customer relationship management along with its associated benefits and challenges

A

Involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability

75
Q

Differentiate between operational and analytical customer relationship management

A

operational supports day to day front office operations or systems that deal w/customers. Analytical is back office operation and strategic analysis.

76
Q

Identify the three current trends extending customer relationship management

A

SRM, PRM, ERM

Supplier, Partner and employee relationship management

77
Q

Describe the role information plays in enterprise resource planning

A

information from different departments and systems are integrated into one system enterprise wide

78
Q

Identify the core and extended areas of enterprise resource planning

A

core: Accounting, finance, HR, Production and Materials mgmt. Extended: BI, CRM, Supply chain mgmt, E-business

79
Q

whats the 4 ebusiness models

A

B2B, B2C, C2B, C2B

80
Q

Describe the six ebusiness tools for connecting and communicating

A

Email, IM, Podcast, Video Conf, Web Conf, Content mgmt systems

81
Q

describe the strategy, operating, and systems layer.

A

strategy is what products are we selling and to who. Operating, whats the processes designs, comp structure to execute on the strategy layer and systems is how do we automate the operating layer and make it more efficient

82
Q

Describe the value added by effectively balancing and leveraging innovation, upgrades, and maintenance of legacy systems.

A

by balancing all systems you can produce new technologies for business partners while still addressing the technical debt the company has occured with legacy systems. for the company to be successful the IT team has to look at innovation, upgrades and maintenance constantly.

83
Q

Analyze the value proposition of innovating, upgrading, or maintaining legacy systems.

A

customer value for innovation, business value and ability to create innovation by upgrading,

84
Q

wha are the 5 strategies Kim Stevenson, CIO of Intel, has developed a leadership program that centers around five attributes that she believes her team needs to become effective IT leaders:

A

breadth=very broad perspective about the market, the journey of the company, and who the customers are.
company 1st = It’s company first, your organization second, and you as a leader third. Systems thinking. “The world is a system with patterns and engagement points, and you, as a leader, must recognize those patterns first. Change agent. “By its nature, IT drives transformation and, as an IT leader, transformation must be a part of your DNA. finally. Courage

85
Q

whats a white hat hacker

A

works @ the request of the systems owner to find vulnerabilities

86
Q

whats a cracker

A

has criminal intent when hacking

87
Q

whats a blackhat hacker

A

break into other peoples computer to either just look around or to steal other peoples info or destroy it

88
Q

whats a script kiddie or bunny

A

find hacking codes on the internet and click and post there way into systems to cause damange or spread viruses

89
Q

what is pretexting

A

form of social engineering in which one indiv lies to obtain confidential data about another invdividual

90
Q

what is a security policy

A

Security Policies identify various rules users are required to follow such as logging off before leaving their desk, never sharing passwords with anyone, and changing passwords every 30 days

91
Q

what is phishing

A

technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. The messages appear to be genuine

92
Q

what is pharming

A

reroutes requests for legitimate websites to false websites. For example, if you were to type in the URL to your bank, pharming could redirect to a fake site that collects your information

93
Q

what is a token

A

are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network

94
Q

what is a project scope

A

describes the business need and the justification requirements and boundries

95
Q

project plan

A

formal approved document the manages and controls the entire project

96
Q

what is the analysis phase

A

analyzes its end user business requirements and refines project goals into defined functions and operations of the intended system

97
Q

what is the design phase

A

establishes descriptions of the desired features and operations of the system including screen layouts business rules, processes and programs

98
Q

what is software engineering

A

approach for constructing information systems through the use of common methods, techniques or tools.

99
Q

what is joint application development

A

employees meet for several days to define or review the business requirements for a system.

100
Q

what is cobit

A

best practices that helps an org maximize the benefits of an info system while at the same time establishing appropriate controls

101
Q

what is RUP (rational unified process methodolody

A

framework for breaking down teh development of software into 4 gates

102
Q

what is Rapid application development

A

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.

103
Q

what is extreme programming

A

breaks a project into tiny phases and devleopers cannot continue on the next phase until the first one is complete

104
Q

what is scrum methodology

A

small teams to produce small pieces of deliverable software using springs or 30 day intervals.

105
Q

what is a PERT chart

A

graphical network model that depicts a projects task and the relationship between them. shows schedule and actual start and end time.

106
Q

what is a gantt chart

A

simple bar chart that lists project tasks vertically against the project time frame. also shows prograess of tasks against the planned duration.

107
Q

what is structured data

A

DEFINED Length type and format that includes numbers dates or strings such as customer address

108
Q

what is a report

A

document with data in a table, matrix or graphical format.

109
Q

what is business intelligence

A

information collected from multiple sources such as suppliers customers competitors that analyzes patterns trends and relationships

110
Q

what is production

A

process where business takes raw materials and processes them into a finished product for its goods or services