IT Management Flashcards

1
Q

Describe the information age

A

infinite quantities of facts are widely available to anyone who can use a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information age and the differences among data,

A

structured and unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

information age and the difference among information,

A

The simple difference between data and information is that computers or machines need data and humans need information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is business intelligence

A

information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is knowledge

A

includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the different departments in a company and why they must work together to achieve success.

A

accounting, finance, HR, marketing, Ops Mgmt, Sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain systems thinking and how management information systems enable business communications

A

A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. Feedback is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter’s actions. Feedback helps the system maintain stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the primary MIS roles along with their associated responsibilities

A

CIO, oversees and ensures strategic alignment, CKO, collecting and maintaining orgs knowledge. CPO-ethical and legal use of info
cso-security of MIS systems, and CTO speed, accuracy, availability and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define critical success factors (CSFs) and key performance indicators (KPIs) and explain how managers use them to measure the success of MIS projects.

A

CSF-high quality products, competitive advantage, reduce product costs, increase cs satisfaction, hire and retain employees
KPI- metrics used for # of product returns, new cs. turnover rates and avg. customer spending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why a business would use metrics to measure the success of strategic initiatives.

A

they can view SCM, CRM, BPR and ERP metrics which helps make strategic decisions for future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the three common business forms

A

sole proprietorship
partnership
corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List and describe the seven departments commonly found in most organizations

A

hr, sales, marketing, Operations, Business, accounting, Finance,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe business processes and their importance to an organization

A

3 steps: measure, monitor, and assign. it at minimum doubles the gains of a project by increasing efficiency, compliance, standardization and agility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare the continuous process improvement model and business process reengineering

A

BPR - analysis and redesign of workflow within and between enterprises
Continuous - attempts to understand and measure the current process, and make performance improvements accordingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the importance of business process modeling (or mapping) and business process models

A

creating either a detailed flow chart, process map, or a graphic description of process showing inputs, tasks, activities in sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain business process management along with the reason for its importance to an organization

A

BPM allows business process to be executed more efficiently and measures performance and identifies opportunities. reduces overhead,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is RAM

A

computers primary working memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is ROM

A

Read only memory, portion of the primary storage that does not lose its contents when the computer is turned off (ex. memory card, memory stick)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

magnetic tape

A

older secondary storage that uses a thin strip of plastic coated with mag sensitivity recording

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a hard drive

A

secondary storage uses discs coated with magnetically sensitive material and housed together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are optical mediums

A

CD-ROM, CD-RW, DVD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explain MIS infrastructure and its three primary types

A

Includes the plans for how a firm will build, deploy, use, and share its data. Information (support ops), agile (supports change) and sustainable(supports environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify the three primary areas associated with an information MIS infrastructure

A

Backup and recovery plan
Disaster recovery plan
Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the characteristics of an agile MIS infrastructure

A
Accessibility
Availability
Maintainability
Portability
Reliability
Scalability
Usability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
describe 3 types of networks
LAN, WAN, MAN local, wide, metropolitan local - within a building, Wide within the country, metropolitian, within a city
26
what is TCP / IP
transmission control protocol/ internet protocol provides technical foundation for the public internet as well as priv networks
27
Describe the relationship between information security policies and an information security plan
Information security policies are developed for people to combat insider issues. by creating a policy you create a plan for security
28
Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response
Authentication & authorization: user id & Pass Prevention & Resistance: firewalls, encryption Detection & Response: intrusion detection software
29
Identify the six policies an organization should implement to protect themselves
Ethical computer use, email privacy policy, information privacy policy, social media policy, acceptable use policy, workplace monitoring policy
30
Explain operations management role in business
forcasting, ops mgmt, scheduling, capacity planning, inventory, quality, training
31
Identify the environmental impacts associated with MIS
increased electronic waste, increased energy consumption, increased carbon emissions.
32
Describe the five characteristics of competitive priorities
cost, quality, delivery, flexibility, service
33
Explain the three components of a sustainable MIS infrastructures along with their business benefits
grid computing: computers georgraphically dispersed coordinated to solve problem. cloud computing single instance of a system serves mutliple customers. virtualized computing: creates multiple virtual machines on a single compuer
34
Compare tactical, operational, and strategic BI
daily, short term, long term. users for ops is managers, analysts. execs and mgr for tactical and strategic
35
Describe the four categories of BI business benefits
Quantifiable benefits Indirectly quantifiable benefits Unpredictable benefits Intangible benefits
36
Explain the cultural, political, and geoeconomic challenges facing global businesses
cultural: language, religion customs etc. Political: Tax, import/export rules, trade agreements. Geoeconomic effects of georgraphic regions on business
37
Describe the four global IT business drivers that should be included in all IT strategies
Nature of the industry, competitive factors, enviromental factors
38
Describe governance and compliance and the associated frameworks an organization can implement
governance-method or system of gov't for mgmt or control. Compliance is yielding or conforming. CoBit: IS audit & Control, ITIL: IT Infras library COSO: comittoee of sponsoring orgs CMMI: Capability maturity model integration
39
Identify why an organization would need to understand global enterprise architectures when expanding operations abroad
includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets
40
Explain the many different global information issues an organization might encounter as it conducts business abroad
authentication, access control, encryption. regulatory issues, technology and country orientated issues.
41
Identify global system development issues organizations should understand before building a global system
country dev systems into global dev systems. multinational dev teams, centers of excellence, outsource dev work
42
Explain why businesses use trends to assess the future
emerging trends and new technologies as they relate to business can help an organization anticipate and prepare for the future
43
Identify the global trends that will have the greatest impact on future business
World’s population will double in the next 40 years People in developed countries are living longer Growth in information industries is creating a knowledge-dependent global society The global economy is becoming more integrated The economy and society are dominated by technology Pace of technological innovation is increasing Time is becoming one of the most precious commodities
44
Identify the technologies that will have the greatest impact on future business
new technologies, automation and demand for scientists, engineers and technicians will continue to grow.
45
Describe the information age and the differences between data, information, business intelligence, and knowledge
The present time, during which infinite quantities of facts are widely available to anyone who can use a computer.
46
Identify the different departments in a company and why they must work together to achieve success
accounting, finance, hr, marketing, ops mgmt, sales
47
Explain systems thinking and how management information systems enable business communications
Systems thinking – A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
48
what is MIS
management information systems. business function like accounting and HR which moves information about people products and processes across the company to facilitate decision making
49
Explain why competitive advantages are temporary along with y the four key areas of a SWOT analysis
temporary because it's based on current time that the customer places greater value on then similar offerings. SWOT is also current.
50
Describe Porter’s Five Forces Model and explain each of the five forces
supplier power:power to drive up prices of materials. threats of new entrants: power of competitors to enter a market. buyer power: power of cs to drive down prices. threat of substitute products & services: power of cust to purchase alternatives
51
Compare Porter’s three generic strategies
cost leadership, differentiation, focused strategy
52
Demonstrate how a company can add value by using Porter’s value chain analysis
firm infras, HR mgmt, Tech development, procurement
53
Identify how an organization can use business process reengineering to improve its business
creates a set of standard activities that accomplish a specific task such as processing customers orders
54
Explain supply chain management and its role in business
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness & profitability
55
Explain customer relationship management systems and how they can help organizations understand their customers
Identify types of customers Design individual customer marketing campaigns Treat each customer as an individual Understand customer buying behaviors
56
Summarize the importance of enterprise resource planning systems
integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations
57
Explain information ethics and its associated issues
Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. issues could be IP, Copyright, pirated software, counterfeit
58
Describe information security and the difference between hackers and viruses.
hacker is a person, experts break into computers and networks for profit or just motivation. Viruses are software that is written with malicious intent to cause annoyance or damage.
59
Explain the four primary traits that determine the value of information
collecting, compiling, sorting, and analyzing information.
60
Describe a database, and the relational database model
Database – maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
61
Identify the business advantages of a relational database
increased flexibility, scalability, performance, information integrity and security. Reduction information redundance.
62
Explain the business benefits of a data-driven website
easy to manage content, store large amts of data and eliminate human errors
63
Explain why organizations would want to integrate databases
elimates needs for manual entry. allows seperate systems to communicate directly with eachother
64
what is Database management systems (DBMS) –
Allows users to create, read, update, and delete data in a relational database
65
what is a data mart
contains subset of data warehouse information.
66
what is ETL
Extraction, tranformation and loading. Process that extracts information from Internal and external databases, transforms the information using a common set of definitions.
67
What are the 4 common charecteristics of Big Data
variety, veracity, volume, velocity
68
Explain data mining and identify the three elements of data mining
process of analyzing data to extract information not offered by the raw data alone
69
Explain the importance of data analytics and data visualization
``` Info graphics Data artist Analysis paralysis Data visualization Business intelligence dashboards ```
70
what is AI
Artificial intelligence (AI) – Simulates human intelligence such as the ability to reason and learn
71
what is the 5 categories of AI
Expert system, neural network, genetic algorithm, intelligent agent, virtual reality
72
Describe supply chain management along with its impact on business
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability
73
Identify the three technologies that are reinventing the supply chain
3d printing, RFI (radio frequency ID), Drones and robotics
74
Describe customer relationship management along with its associated benefits and challenges
Involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization's profitability
75
Differentiate between operational and analytical customer relationship management
operational supports day to day front office operations or systems that deal w/customers. Analytical is back office operation and strategic analysis.
76
Identify the three current trends extending customer relationship management
SRM, PRM, ERM | Supplier, Partner and employee relationship management
77
Describe the role information plays in enterprise resource planning
information from different departments and systems are integrated into one system enterprise wide
78
Identify the core and extended areas of enterprise resource planning
core: Accounting, finance, HR, Production and Materials mgmt. Extended: BI, CRM, Supply chain mgmt, E-business
79
whats the 4 ebusiness models
B2B, B2C, C2B, C2B
80
Describe the six ebusiness tools for connecting and communicating
Email, IM, Podcast, Video Conf, Web Conf, Content mgmt systems
81
describe the strategy, operating, and systems layer.
strategy is what products are we selling and to who. Operating, whats the processes designs, comp structure to execute on the strategy layer and systems is how do we automate the operating layer and make it more efficient
82
Describe the value added by effectively balancing and leveraging innovation, upgrades, and maintenance of legacy systems.
by balancing all systems you can produce new technologies for business partners while still addressing the technical debt the company has occured with legacy systems. for the company to be successful the IT team has to look at innovation, upgrades and maintenance constantly.
83
Analyze the value proposition of innovating, upgrading, or maintaining legacy systems.
customer value for innovation, business value and ability to create innovation by upgrading,
84
wha are the 5 strategies Kim Stevenson, CIO of Intel, has developed a leadership program that centers around five attributes that she believes her team needs to become effective IT leaders:
breadth=very broad perspective about the market, the journey of the company, and who the customers are. company 1st = It's company first, your organization second, and you as a leader third. Systems thinking. "The world is a system with patterns and engagement points, and you, as a leader, must recognize those patterns first. Change agent. "By its nature, IT drives transformation and, as an IT leader, transformation must be a part of your DNA. finally. Courage
85
whats a white hat hacker
works @ the request of the systems owner to find vulnerabilities
86
whats a cracker
has criminal intent when hacking
87
whats a blackhat hacker
break into other peoples computer to either just look around or to steal other peoples info or destroy it
88
whats a script kiddie or bunny
find hacking codes on the internet and click and post there way into systems to cause damange or spread viruses
89
what is pretexting
form of social engineering in which one indiv lies to obtain confidential data about another invdividual
90
what is a security policy
Security Policies identify various rules users are required to follow such as logging off before leaving their desk, never sharing passwords with anyone, and changing passwords every 30 days
91
what is phishing
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. The messages appear to be genuine
92
what is pharming
reroutes requests for legitimate websites to false websites. For example, if you were to type in the URL to your bank, pharming could redirect to a fake site that collects your information
93
what is a token
are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network
94
what is a project scope
describes the business need and the justification requirements and boundries
95
project plan
formal approved document the manages and controls the entire project
96
what is the analysis phase
analyzes its end user business requirements and refines project goals into defined functions and operations of the intended system
97
what is the design phase
establishes descriptions of the desired features and operations of the system including screen layouts business rules, processes and programs
98
what is software engineering
approach for constructing information systems through the use of common methods, techniques or tools.
99
what is joint application development
employees meet for several days to define or review the business requirements for a system.
100
what is cobit
best practices that helps an org maximize the benefits of an info system while at the same time establishing appropriate controls
101
what is RUP (rational unified process methodolody
framework for breaking down teh development of software into 4 gates
102
what is Rapid application development
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
103
what is extreme programming
breaks a project into tiny phases and devleopers cannot continue on the next phase until the first one is complete
104
what is scrum methodology
small teams to produce small pieces of deliverable software using springs or 30 day intervals.
105
what is a PERT chart
graphical network model that depicts a projects task and the relationship between them. shows schedule and actual start and end time.
106
what is a gantt chart
simple bar chart that lists project tasks vertically against the project time frame. also shows prograess of tasks against the planned duration.
107
what is structured data
DEFINED Length type and format that includes numbers dates or strings such as customer address
108
what is a report
document with data in a table, matrix or graphical format.
109
what is business intelligence
information collected from multiple sources such as suppliers customers competitors that analyzes patterns trends and relationships
110
what is production
process where business takes raw materials and processes them into a finished product for its goods or services