Midterm 1 Flashcards

1
Q

What is an information system

A
  • An information system (IS) is a group of components
    that interact to produce information
  • Five fundamental components of computer-based
    information systems are: Hardware, software, data, people, procedures

Information Systems are more than just computers
and software.
§ IS combine the people and procedures they use to
make technology work for business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the characteristics of the five components of IS?

A

Hardware and programs are on the data side, procedures and people are on the human side and date is the bridge between the two sides

Programs and procedures are instructions while people and hardware are actors

To the left automation works to move work from human to computer side and towards the right has an increasing level of difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MIS

A

MIS = Management Information Systems

  • MIS is the development and use of information
    systems to help businesses achieve goals and
    objectives
  • Key terms:
    § Development and use § Information systems
    § Business goals and objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does IS differ from IT

A

Information system (IS) is a system of hardware,
software, data, procedures, and people that produce
information

  • Information technology (IT) represents raw
    technology components of IS
    § Hardware
    § Software
    § Data structure and components

In other words, inventions, standards, products!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does IT fit within IS

A
  • IT alone will not help an organization achieve goals
  • IT must be embedded into an IS to help accomplish
    objectives
    § Technology must be combined with people and procedures to be useful
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the world now “flat” with internet and global
communication? and what challenges does this provide for us

A

▪ Reduced economic advantages of
developed countries
▪ Compete for jobs markets, resources and
even ideas from less developed world

▪ Develop high-level skills through education
▪ On-the-job experience that cannot be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital firm

A
  • NOT about just adding a computer
    system to the mix. Then what is it?
  • information technology as the “core of
    the business” and the primary
    management tool
  • IS allows the firm to response more
    rapidly to changes in their environment
    and thus survives in turbulent times
  • It allows “time-shifting” and “space-
    shifting”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you plan to acquire and use IS

A

▪ Understand how they are created (and cost)
▪ Take an active role in order to insure that system will
meet your and your users’ needs
▪ Determine how to best use the system
▪ Take into account other functions necessary to keep
the system running:
Security, backup and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the six strategic business objectives

A

Operational excellence
New products, services and business models
Customer and Supplier Intimacy
Improved decision making
Competitive advantage
Survival

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is operational excellence

A

improve the efficiency of their operations in
order to achieve higher profitability
* coupled with changes in business practices
and management behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is New products, services, and business
models

A
  • a major enabling tool for firms to create new
    products and services, as well as entirely
    new business models, e.g. Apple Inc.
  • business model describes how a company
    produces, delivers, and sells a product or
    service to create wealth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is customer and supplier intimacy

A
  • Wal-Mart digitally links their suppliers to everyone of
    Wal-Mart’s 5,289 stores worldwide. Suppliers are able to ensure the continuous flow of products to the stores in order to satisfy customer demands
  • Mandarin Oriental uses computers to keep track of
    guests preferences such as room temperature, frequently dialed number, TV channels etc. The digital profile is stored in a central database and be used all over the world
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is improved decision making

A
  • The inability to make informed decision
    resulted in raising costs and lost customers
  • use real-time, accurate data from the
    marketplace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is competitive advantage

A
  • Doing things better than your competitors,
    charging less for superior products, and responding to customers and suppliers in real time
  • Toyota Production System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is survival

A
  • Information systems is not a luxury, they
    are necessities of doing business. Example: Citibank was the first banking firm to introduce ATMs
  • Regulations changed - turn to information systems and technologies in order to comply with the new requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the interdependence between organizations and information technology

A

Hardware data management and telecommunications form software which works with businesses to help them achieve their strategic objectives through businesses processes using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what was the percentage of GDP ICT accounted for in 2019

A

4.8% (94.9 billion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the gap between business leaders and IT leaders

A

Business leaders are strong at business but weak at IT and IT leaders are expert at IT but novice at business. we must bridge that gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is IT’s impact nowadays on organizations

A
  • Allowed the individual to compete with the
    corporation: iStockPhoto
  • Changed music delivery: success of streaming
    services such as Spotify and Apple Music and impact
    on buying music.
  • Disrupting the Taxi industry with Uber and Lyft
  • How about impact on newsprint, textbook publishing,
    traditional software sales, desktop computers, need
    for increased customer service, “customized”
    manufacturing, and much, much more.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Explain Moore’s law with respect to increasing rate of tech

A
  • “The number of transistors per square inch on an
    integrated chip doubles every 18 months.”
    ▪ The speed of a computer chip doubles every 18
    months
    ▪ Price/performance ratio of computers has fallen dramatically
  • Computers are smaller * Computers are less expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What id disruptive tech

A

a new technology that changes or transforms the industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is data

A

recorded facts or figures
not meaningful on their own and requires context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is information

A
  • Information is data with a meaning!
    – It is the central focus of information systems
    – It is used and created by activities
    – Business processes create, process and store information
    – “Information Systems” support business processes by automating or
    facilitating the creation, processing, and storage of information
  • The concept of Information can be difficult to define
    – Data presented in a meaningful context
    – Processed data
    – Data processed by summing, ordering, averaging, grouping, comparing, or
    other similar operations – A difference that makes a difference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

explain perspectives on information systems

A

data combines with info to form an information system which provides value

Raw data from a supermarket checkout counter can be processed and organized to produce meaningful information, such as the total unit sales of dish detergent or the total sales revenue from dish detergent for a specific store or sales territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what makes good information and what is most important

A

accurate
Timely
Relevant
Just barely sufficient
worth its cost

Most important are accurate and timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is the role of information in business processes

A
  • Business processes use, generate and store information:
    – Business processes bring together important items of data in context
  • Eg. Quantity received = 6, Shipping Invoice = 8
    T hese should be equal. There is a problem.
  • Business Processes bring together information so it can be
    understood at various levels(??)
  • Information from business processes are useful for managerial and
    strategic decisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what do business activities use information systems for

A

– Automate the generation of information
– Manipulate and store data and information
– Uncover new and novel methods (activities) to make the entire business
process more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is required for an information system to be used effectively

A

U sing information systems effectively requires an understanding of the organization, management, and information technology shaping the systems. An information system creates value for the firm as an organizational and management solution to challenges posed by the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what are the dimensions of information systems

A

– Organizations
* It usually has a hierarchical structure
* It has different business functions
* Business process: formal and informal rules
* Culture: set of fundamental values and assumptions
– Management
* To make sense out of many situations and solve
problems
* Also creative work! Design new products and even
recreate the organization
– Technology

Change in process leads to change in structure which leads to change in decisions

Management must support correct incentives and train properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How do the three dimensions relate to business

A

– Management (M)
* Determine Business strategies
* Select new products and services – Organization (O)
* Implement these strategies
* Work with outside parties etc. – Technology (T)
* Provide the means to implement the strategies
* Such as a electronic platform or network etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Review slide 16 of lecture 3

A

THIS IS IMPORTANT BRAYDEN DONT SKIP OVER THIS YOU FUCKING DUMBO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what are the different decision levels and wear systems do they use to make them

A
  • Operational decisions concern day-to-day activities
    – transaction processing systems (TPS)
  • Managerial decisions concern the allocation and utilization of
    resources
    – management information systems (MIS)
  • Strategic decisions concern broader-scope, organizational issues
    – executive information systems (EIS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is a TPS and what strategic bus objective can it meet

A

– Transaction processing systems
* The operational level of the organization include various
units such as order processing, material movement control, payroll, accounts payable, and employee record keeping etc.
* The information systems used in this level of the
organization are transaction processing systems (TPS), so called because they record the routine transactions that take place in everyday operations.
* The transaction processing system records the data from
everyday operations throughout every division or department in the organization. Each division/department is tied together through the TPS to provide useful information to management levels throughout the company.

Operational excellence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is an MIS

A

– Management information systems
* Those using management information systems (MIS)
require information on a periodic basis instead of on a daily recurring basis like those using a transaction processing system. The MIS will also draw data from the transaction processing system to help managers answer structured questions
* Managers also require information on an exception basis.
* A management information system is used by managers
throughout the organization to help them in directing, planning, coordinating, communicating, and decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a DSS

A

– Decision-support systems
* An MIS uses internal data to supply useful
information. A DSS uses internal data but also combines it with external data to help analyze various decisions management must make. Analyzing complex, interactive decisions is the primary reason for a company to use a DSS.
* There are a lot of gray areas in successfully managing
an organization and the larger the company, the more diverse the decision-making process becomes.

  • Decision-support systems are used for
    complex “what-if” questions that require
    internal and external data. Decisions at
    this management level are mostly
    semistructured so the information
    system must respond to the unique
    requirements of the executives.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is an ESS

A

– Executive support systems
* They are used at the very top of management. At
the strategic level, the typical decision is very unstructured. Often there is no specific question, but rather a series of undefined situations executives may face.
* There are no easy, definable answers. These
executives require summarized, historical information gleaned from all other levels of the organization, coupled with large amounts of external data gathered from many sources.

  • Executive support systems must be easy to
    use and the information must be easily
    manipulated. The ESS must be able to
    incorporate external information with internal
    data to offer concise, complete information
    for the imprecise and incomplete scenarios
    executives face. And most importantly, the
    systems must have a fast response time.
  • Senior executives often access information
    through the use of a portal.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

how do all these business information systems relate to one another

A

TPS extracts processes and adds analysis models and external data to become MIS or DSS and from there it adds a wider range of information to suit specific needs to become ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what is a structured vs unstructured decision and who makes the,

A
  • A structured decision is one for which there is an understood and
    accepted method for making the decision – Example: How much tax do I need to pay?
  • An unstructured decision process is one for which there is no
    agreed-on decision-making method
    – Example: Whom should I marry? * Note: terms structured and unstructured refer to the decision
    process/method, not to the underlying subject/problem

Operational managers (TPS) make structured

Managerial (MIS) do both

Strategic executives (EIS) make unstructured decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is a computer at it’s most basic level

A

Accept input (raw data)
Process that data
Produce output (information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

explain computers in the 50’s

A
  • General-Purpose Mainframe and Minicomputer Era: 1959
    to Present
    – The mainframe era began with highly centralized
    computing with networks of terminals concentrated in
    the computing department – While early models contained proprietary software and
    data, today’s mainframes are able to process a wide
    variety of software and data. – IBM began this era and remains the single largest
    supplier of mainframe computing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what is a mini computer

A

– Minicomputers are defined as middle-
range computer. – These powerful machines cost much
less than mainframes, and make
decentralization possible. – They can be customized to the specific
needs of individual departments or
business units rather than time sharing
on a single huge mainframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what is the client server era

A
  • Client/Server Era: 1983 to Present
    – As the desktop and laptop personal
    computers became more powerful and cheaper, businesses began using them to replace mini-computers and some mainframe computers by networking them together.

wired means safer and better and that’s when the computers are physically linked to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what is the enterprise internet computing era

A
  • Enterprise Internet Computing Era: 1992
    to Present
    – Many firms found it difficult to integrate
    all of their local area network ( LANs) – The problems created by proprietary,
    closed systems are being solved by the
    standards and open-source software
    created in this era, such as TCP/IP
    (internet protocol) for communication

IT makes things cheaper

– Also need software such as ERP to link all
separate application together – The promises of delivering critical business
information painlessly and seamlessly are
getting more difficult because of the ever-
changing landscape of technology products
and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the cloud computing era

A
  • Cloud Computing era (2000 to Present)
    – This model of computing relies on the
    massive computing centers owned by the likes of Google, IBM, Microsoft, and even Amazon.com.
    – “What is Google’s cloud? It’s a network
    made of hundreds of thousands, or by some estimates 1 million, cheap servers, each not much more powerful than the PCs we have in our homes.
    – It stores staggering amounts of data, including
    numerous copies of the World Wide Web. This
    makes search faster.
    – Unlike many traditional supercomputers, Google’s
    system never ages. When its individual pieces die,
    usually after about three years, engineers pluck
    them out and replace them with new, faster boxes. – “This means the cloud regenerates as it grows,
    almost like a living thing.” ( Google and the Wisdom
    of Clouds, BusinessWeek, Dec 24, 2007)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are networking personal computers, LANs and WANs

A
  • Networking Personal Computers
    – Critical to the rapid adoption of personal computers and rise of social
    networks. – Local Area Networks (LANs)
  • linking many personal computers together * shared access to data, printers, and other peripheral devices
    – Wide Area Networks (WANs)
  • the Internet * email * web browsing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

what is the internet of things

A
  • Networking is not just about personal computing devices
  • The Internet of Things is about connecting “dumb” devices to make
    them smart, for example:
    – Thermostats – Smoke alarms – Refrigerators – Coffee makers – …and other machines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is hardware and it’s categories

A
  • Hardware consists of electronic components used to input, process, output, and
    store data
  • Basic hardware categories:
    – Input
    – Processing
    – Output
    – Storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

explain input process output and storage

A

Input (keyboard, mouse, scanner ect) goes to be processed (CPU and Main memory) where information can be moved back and forth between storage (Magnetic disk and optical disk) and then moves to output (video display, printer, speaker, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are some common input and output devices

A

slide 31 and 32 for examples and categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Explain computer data

A
  • Binary Digits (bits)
    – Used to represent data
  • Represented as either zero ( 0) or one (1)
  • Bytes
    – Bits grouped in 8-bit chunks (represent one character)
    – Specifications for size of memory
  • K kilobyte1024 bytes
  • MB megabyte 1024 K
  • GB gigabyte 1024 MB * TB terabyte 1024 GB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what is the data hierarchy

A

A computer system organizes data in a hierarchy that starts with the bit, which represents either a 0 or a 1. Bits can be grouped to form a byte to represent one character, number, or symbol. Bytes can be grouped to form a field, and related fields can be grouped to form a record. Related records can be collected to form a file, and related files can be organized into a database.

database
File
record
field
Byte
Bit

52
Q

What do you need to set up a network

A

a PC (not a motherboard)

53
Q

What is CPU RAM and ROM

A
  • Central Processing Unit ( CPU) (microprocessor and memory)
    – Transfers program or data from disk to main memory
    – Moves instruction from main memory via
    data channel or bus
  • Random Access Memory (RAM) (Primary storage)
    – Volatile (turn computer off, RAM goes away)
    – Working memory… like a blackboard
    – Contains running program instructions
    – Contains running Operating System (OS) instructions
  • Read Only Memory (ROM) (primary storage)
    – Non-volatile (stays when power is off)
    – Used to “boot-up” machine
54
Q

what is secondary storage

A

flash memory
fixed disks
Optical disks
the cloud

55
Q

what is flash memory

A

There are two types of flash memory:
* Flash memory device – very small storage device that plugs into a USB port (e.g.
USB key)
* Flash memory card – high capacity storage card that is inserted into a reader
which in turn plugs into a USB port (e.g. digital camera memory)

56
Q

what is fixed disks

A
  • Fixed Disk Drives (Mechanical Hard Drives )
    – Capacity is measured in bytes – GB (Gigabytes)
    – Common storage size 1000 GB – 8000 GB (8 TB or TeraByte)
  • Solid State Hard drives (SSD)
    – Uses flash memory for storage purposes
    – Very fast but expensive
    – Common storage sizes 128 GB – 1 TB
    – 1 TB SSD sells around $500

Not ideal cuz they move

57
Q

What is an optical disk

A
  • Compact Disks (CD) – Read Only Memory (CD-ROM)
    – CD-ROM, CD-R, CD-RW
    – Store up to 700 MB of data * Digital Versatile (or Video) Disk (DVD)
    – DVD-ROM, DVD-R, DVD+/-R DL, DVD-RW
    – Stores up to 8.5 GB of data * Blu-ray –
    – BD: High density DVD (uses blue laser) that stores up 25 GB (single layer) or 50 GB (Dual Layer)
    – BDXL: newest standard with storage capacities of 128 GB
58
Q

What is the cloud

A
  • Cloud storage is hard drive space accessible via the internet
  • Becoming popular with Tablets and mobile devices
  • Convenient for working on same data files using multiple devices
  • Commercial services: iCloud, OneDrive, Google Drive, DropBox (and
    many, many more)
  • Be aware of national storage laws (protection of privacy issues) * We have SFU Vault at this school.
59
Q

what is the difference between a client and a server

A
  • Client computers used to review and process information
    – Eg, word processing, spreadsheets, database access
    – Connect to servers for Web, e-mail, database
  • Servers provide access to information and application ( serve the clients
    servers, order processing servers, video servers, and many, many more. – The “Cloud” is a term assigned to servers accessible anywhere and anytime
    (over the internet)
    )
    – Faster, larger, more powerful
    – Include, database servers, email servers, web servers, application servers, sms

Clients request a domain and the server responds with a content page or error code

60
Q

what os the human to computer interface

A

User
Application program
Operating system
Computer
BIOS

61
Q

What is firmware

A
  • Computer software installed into devices
    – Printers, print servers, communication devices
    – Coded like other software
    – Installed into read-only memory
  • becomes part of device’s memory – Can be changed and upgraded
  • Basic Input/Output System (BIOS)
    – Instructions stored in ROM installed on the motherboard
    – Used when a computer is initially booted up
62
Q

what Are the computer software types

A

Two types:
1. Operating System (OS)
* program that controls computer’s resources
2. Application Programs
* perform specific user tasks

  • Constraints
    – a particular version of an operating system is written for a particular type of
    hardware – application programs are written to use a particular operating system
63
Q

what are the major operating systems

A
  • Windows (Microsoft)
    – Used by ~ 91% of the world’s desktops (73% of all computing devices)
  • Mac OS (Apple)
    – Used by ~ 7% of the world’s desktops – Apple Computer, Inc. developed for Macintosh computers
  • Linux (Open Source – What is it?)
    – Used by ~ 1.7% of the world’s desktops
  • Mobile Operating Systems
    – iOS (Apple) 27%, Android (Google) 67%, WindowsPhone (Microsoft) 2%
64
Q

what are the infrastructure components

A

Internet platforms
Computer hardware platforms
Operating system platforms
Enterprise software platforms
Telecommunication platforms
consultant and system integrators
data management and storage

65
Q

what is the difference between owning and listening a program and how do you acquire application software

A
  • Users buy license to use program * Ownership remains with development company * Linux belongs to everyone (open-source)
    – No license fee
    – Can modify but any modification must be made public and free
    – Companies make money by offering support
  • Application Software consists of programs that perform a business
    function
    – Some are general purpose (ie, MS Office) – Some are specific (ie, Student information management system – SFU’s SIMS)
  • Application software acquisition
    – Buy off-the-shelf
  • may not be a good fit * may need alterations
    – Custom-developed software
  • tailor-made for organization
66
Q

what are the application software categories

A
  • Horizontal-market application software
    – Provides capabilities common across all organizations and industries
    – Typically general purpose software
  • Examples: Word, Excel, PowerPoint, Acrobat, Photoshop, Paint Shop Pro
  • Vertical-market application software
    – Serves need of specific industry
    – Usually can be altered or customized
  • Examples: dental billing system, restaurant order processing system
  • One-of-a-kind application software
    – Designed for specific need
  • Example: Quicktax software (income tax preparation software)
  • Other (dual-category) application software
    – Software that doesn’t fit clearly in other categories
  • Example: CRM (Customer relationship management software)
  • Custom developed software
    – Created by the company for the company
67
Q

explain viruses and security implications

A
  • Virus
    – Computer program that replicates itself
    – Consumes computer resources * payload causes unwanted activity
  • Macro viruses
    – Attached to various types of documents
    – When document opened, virus placed in startup files of the application
    – After, virus infects every file the application creates or processes
  • Worm
    – Virus that propagates using Internet or network
    – Spread faster than other viruses
    – Specifically programmed to spread
    – Actively use the network to spread
    – Choke networks making them unusable
68
Q

How do you prevent viruses

A
  • Patch security holes
    – check vendors regularly
  • Never download from unknown sites
  • Don’t open email attachments from strangers
  • Don’t open unexpected email attachments
  • Don’t rely on file extensions
  • Purchase licenses for products that detect and eliminate viruses
    – If you have a virus:
  • follow instructions to remove it
  • may need to delete it by reformatting and reinstall clean
69
Q

Define telecommunication

A

The electronic transfer of data is called Telecommunications

The transfer can occur between people or machines

Two people talking on a telephone is Telecommunication

70
Q

Define communications Media

A

The transfer of electronic data occurs through
Communications Media

Several media exist including: Twisted Pair Copper Coaxial Cable Fiber Optic Cable Wireless Technology

71
Q

what are the two basic ways to send data

A

Analog continuously varying frequency smooth but inaccurate

series of bits (high voltage = 1, low voltage = 0) accurate and choppy

72
Q

Define network

A

A computer Network is a collection of computers that communicate with one another over transmission lines

A network can be as small as two machines

or large enough to connect many machines across several continents

73
Q

define protocols

A

The procedures used to transfer information between machines are called Protocols

Protocols ensure that the data being sent by one machine, will be recognized by other machines receiving the data
Two machines must agree on the protocol to use, and they must follow that protocol as they send messages back and forth

74
Q

what is a computer network and what are the three types

A
  • A computer network is a collection of computers that communicate
    with one another over transmission media * Three basic types:
    – Local Area Network (LAN)
    – Wide Area Network (WAN)
    – Really, really large network (Internet)
75
Q

What is a local area network LAN and what are their components

A
  • LAN connects computers residing in a single physical site
    – Two to several hundred computers
    – One “small” geographic area
    – Communication lines can be placed where the organization wants
  • A LAN typically requires
    – File server for storing shared files
    – Print sever for sharing a single printer
    – Application server for sharing applications
    – Switch: special purpose device (eg, router or a computer) that controls data
    traffic flow on LAN
    – Network Interface Card (NIC): hardware that connects computers together
    (ie, where you plug-in the network cable.
76
Q

what is a LAN with wireless connection

A

Wireless NIC (WNIC) * LAN operation
– NICs operate on 802.3 protocol (Ethernet)
– WNICs operate on 802.11 protocol (Wi-Fi)
* 802.11b is slower than 802.11g which is slower than 802.11n * 802.11n is the current standard
– WNICs connect to Access Point (AP)

77
Q

what is a wide area network WAN

A
  • WAN connects computers in different geographical areas
    – Two or more separated sites
  • Uses communication networks from vendors
    – Licensed by government
  • An Intranet is a controlled, self contained grouping of information
    resources that can be accessed within a single company using Web
    browsers
  • An Extranet is similar to an Intranet but is designed to facilitate
    communications between two or more business partners
78
Q

Is the internet a network? explain

A
  • Network of networks
  • Connect LANs and WANs
  • Uses a variety of communication methods and conventions
    – Seamless flow of data provided by layered protocol
  • set of standard rules and procedures enabling machines to communicate
  • The Internet is a network, this means:
    – Each and every computer on the Internet has a unique address
    – Standards for how to transfer files between computers must exist
    – Methods for transporting files across the network must exist
  • To accomplish this, the network is divided into Layers
79
Q

what are the layers of network

A
  1. Network access layer - equipment, signalling and communication between machines- transmits within a single network (LAN)
  2. Internet Layer
    - works with IP address organization and timing constraints- transmission across internets
  3. Transport Layer
    - opening and maintaining connections uses the transmission control program to ensure packets are received with correct content - transmission across internet
  4. Application layer
    - Data passed between program and the transport layer -program for mail web browsing and file transfer
80
Q

explain step 1 of the layers of network

A
  • The address is defined in the Internet Protocol (IP) and is called an IP
    Number

– This “IP number” is a four byte value that, is expressed by converting each
byte into a decimal number (0 to 255) and separating the bytes with a period.
This is known as IPv4.
– For example, the web server at SFU has the
IP address 142.58.102.68

81
Q

How does the network know where you want to go without putting in the IP address

A
  • The Domain Name System (DNS) is a distributed Internet directory
    service (database). DNS is used mostly to translate between domain
    names and IP addresses, and to control Internet email delivery.
82
Q

Hoe does the DNS work

A
  • When you type in a URL, your browser sends a request to the closest name server. If that server has ever fielded a request for the same
    host name it will locate the information and reply. * If the name server is unfamiliar with the domain name, the resolver
    will attempt to “solve” the problem by asking a server farther up the
    tree. If that doesn’t work, the second server will ask yet another -
    until it finds one that knows.
83
Q

Explain step 2 of the layers of network

A
  • Now that we know the address for our request, we have to get our
    request ready to send
  • This is a job for HTTP
  • Hyper Text Transfer Protocol (HTTP)
    – HTTP is the Internet protocol for transferring hypertext files
    – HTTP handles
  • Requests for Uniform Resource Locator (URL)
  • Responses (usually HTML) from the request
    – It requires the host to use an HTTP server program, and the viewer to use a
    HTTP browser
  • In Short: Hyper Text Transfer Protocols (HTTP) help us to send web
    pages across the web
84
Q

what are other transfer protocols on the internet

A
  • File Transfer Protocol (FTP)
    help us to send files across the network
  • BitTorrent
    Transfer files using peer-to-peer (P2P) file sharing
  • Post Office Protocol (POP)
    help us receive mail messages across the web. Server assumes one
    client
  • Internet Message Access Protocol (IMAP)
    help us receive mail messages across the web. Server assumes
    multiple clients.
85
Q

Explain step 3 of the layers of network

A
  • Now that we have created the HTTP request, we have to deliver that
    request to the correct address
  • This is a job for TCP and IP
    – TCP and IP always work together, that’s why they are called TCP/IP
86
Q

What is TCP

A

TCP: Transmission Control Protocol
* TCP controls data “packets”. * Responsible for verifying the correct delivery of data from client to
server. * Data can be lost in the intermediate network. TCP adds support to
detect errors or lost data and to trigger re-transmission until the data
is correctly and completely received.

87
Q

How does tcp relate to step 3 of the layers of network

A

TCP: Transmission Control Protocol * TCP fragments large HTTP data units
– sequence number added to each TCP data unit
* TCP is a connection-oriented protocol
– reliable (error correction and detection)
– retransmission of lost or damaged data units

88
Q

What is IP

A

IP: Internet Protocol
* Responsible for moving packet of data from computer to computer
* IP carries each message as a collection of packets
* IP forwards each packet based on a four byte destination address (the
IP number)
* IP operates on gateway machines that move data from department to
organization to region and then around the world

89
Q

What is packet switching

A

moving data across the internet in tiny bits and assembling it to form a website or information

90
Q

what are the 5 stages of packet switching

A

Step 1: Creates packets
– Each message is split into small packets by a
packet assembler/disassembler (PAD)
– A header identifies destination, number of packets, and packet order

Step 2: “Who’s your daddy” protocol ©
– Each packet takes their own path through the network
– At each node they ask “Are you my daddy?”
– If yes, they are collected, if no they are sent on

Step 3: Re-assembly
– Once all of the packets reach the destination nodes they are reassembled by
the PAD into the original message

Step 4:
* Once TCP/IP has done its job, the request for a page at a URL is
received at the server
* This request is processed through HTTP on the server
* Each request will be provided with a response

Step 5:
* The request triggers a response
* The response is generated by HTTP and is carried back to the
requestor using TCP/IP
* In our case, the response is a small file containing HTML

91
Q

what is a firewall

A
  • Firewall is a device that prevents unauthorized network access * May be special-purpose computer or program
  • Organizations may have multiple firewalls
    – perimeter firewalls sit outside organizational network
    – internal firewalls are inside network
    – packet-filtering firewalls examine source address, destination address, and
    other data before allowing message to pass – may filter both incoming and outgoing messages
  • Access Control List (ACL) encodes rules stating what packets are allowed or
    prohibited
92
Q

What is a VPN and why is it important

A
  • Virtual Private Network (VPN)
    – Uses public Internet or private internet to create appearance of private point-
    to-point connections – Client and server have point-to-point connection called a tunnel
  • private pathway over shared network – Secure, encrypted communications
93
Q

what is a VoIP and creepy crawlers

A
  • Voice over Internet Protocol (VoIP)
    – Sends packets containing voice conversation across the Internet
    – Commercial VoIP services use broadband
    – VoIP to VoIP phone calls can be free
  • Web Crawlers and Search Engines
    – Search engines are used to search for information on the Internet
    – Web crawlers browse the web to find URLs
    – Search engine indexing
  • creates indexes for the results from the web crawling
94
Q

how do we solve the problem of
– Data fragmented in isolated databases and files
– Time-consuming reporting processes
– Outdated data management technology

A

– Replace disparate systems with enterprise system, with
centralized mainframe and data management system

95
Q

what are the problems with managing data in a traditional file environment

A
  • Problems with the traditional file environment (files
    maintained separately by different departments)
    – Data redundancy:
  • Presence of duplicate data in multiple files

Data inconsistency:
* Same attribute has different values –

Program-data dependence:
* When changes in program requires changes to data accessed by program
– Lack of flexibility
– Poor security
– Lack of data sharing and availability

96
Q

what is traditional file processing

A

each section of a company (accounting, marketing etc) have their own program and use a master file to retrieve data. This leads to data redundancy, inconsistent and wasted storage resources

97
Q

define content and conflict management

A

[The Long Definition]
* Content is related to intellectual property
– a form of creative endeavour that can be protected through a trademark,
patent, copyright, industrial design, or integrated circuit topography
* Varies by industry
* Organizations may store data, documents, spreadsheets,
presentations, web pages, text from blogs and discussion boards,
graphics, video files, audio files, etc.

[The short Definition]
* Content
– The data, graphics, sound, images, and video that are of importance to the
organization

98
Q

Define content management

A
  • Content Management
    – Creating, storing, and editing the content an organization has captured
  • Content management includes
    – database management systems (DBMS)
  • Enables integration with multiple applications
    – content management system (CMS)
  • Used to format the presentation of data to a uniform standard
  • Content management managerial challenge
    – processing and storing the right content
    – getting the right content to the right person in the right format at the right
    time
99
Q

what is the difference between spreadsheets and data bases

A

Spreadsheet and database keep track of things, but…
* Spreadsheets
– Keep lists typically involving a single important thing (ie, concept)
* Eg, lists of MP3 songs you have
* Databases
– Keep multiple lists of related things (themes)
* Eg, lists of artists, albums, as well as MP3 songs

100
Q

what is the data heirarchy (from bottom to top)

A

database (many tables and their relations)
Table (many records of same info)
Record (some related fields)
Field (many bytes)
Byte (8 bits)
Bit

101
Q

what are bits and bytes

A

With Information Systems, all content is stored in digital form
* Bit: Smallest unit is a bit which represents either 1 or 0
* Byte: A byte = 8 bits the most common storage unit
One byte can be translated into a Character For example the byte “01000001” = “A”

102
Q

What is a field

A
  • A Field is a representation of one fact, that is an attribute of a thing or
    an event
    – e.g., name, account number, account balance, date
  • Types of fields:
    – Character strings (text)
    – Numeric:
    decimal / binary fixed point / floating point character (special representation)
    – Logical (can be one of ‘true’ or ‘false’) – Special: date, currency, memo…
103
Q

what is a record and what are the two types

A
  • A Record is a group of logically related fields
    – Examples:
  • Student Name, Student Number, Address
  • Account number, Name, Deposit amount
  • Course name, Course number, Course description
  • Date, Order number, Order amount, Sales tax

Master record: * A record representing the status of a business entity * Examples: a customer account, an inventory item record

Transaction record: * A record representing an event (change) in the business * Examples: a payment made, an invoice issued, inventory reduction

104
Q

What is a table and what is a primary key

A

A Table (also called File) is a set of records about a thing or event

Records (info in boxes)
Field (category of records)

A Primary Key is a field (or a set of fields) that uniquely identifies records

105
Q

what is a data base and what are relational database tables

A
  • A Database is a set of tables that are related logically (tables + relationship amongst rows in tables + metadata)

A relational database organizes data in the form of two-dimensional tables. Illustrated here are tables for the entities SUPPLIER and PART showing how they represent each entity and its attributes. Supplier Number is a primary key for the SUPPLIER table and a foreign key for the PART table.

106
Q

what is the difference between data and meta data

A
  • The main difference between Data and Metadata is that data is
    simply the content that can provide a description, measurement, or
    even a report on anything relative to an enterprise’s data assets. On the other hand, metadata describes the relevant information on
    said data, giving them more context for data users.
  • Databases are self-describing
    – contains, within itself, a description of its contents
  • Metadata
    – Data that describe data
    – Makes databases more useful
    – Makes databases easier to use
107
Q

What is a relational database

A

Multiple tables that work together to provide information. for example one table one table has students and their student numbers and another has student numbers and GPA’s the two allow you to relate a student to a GPA

108
Q

what are the types of relationships

A

one to one (person to show size)

One to many (name of person to number of friends)

Many to Many (students to courses)

109
Q

what are the components of a database application system

A

user
Database application
Database management system (DBMS)
Database

110
Q

what is a DBMS and what does it do

A
  • Database Management System (DBMS) is a system that creates,
    process, and administers databases
    – Usually licensed from vendors, eg
  • Microsoft SQL
  • Microsoft Access (personal DBMS)
  • Oracle
  • MySQL (open-source)
  • DBMS and database are two different things!
  • DBMS is used to create tables, relationships and other structures in the
    database * DBMS manages access to databases
    – Applications use DBMS to read, insert, modify, or delete data – Structured Query Language (SQL)
  • international standard for processing a database
  • DBMS administers databases
    – Can be used to set up security – Used to back up data – Add structure to improve performance – Remove data
111
Q

what is a database application

A
  • A database application is a collection of forms, reports, queries, and
    application programs that process a database, and make its contents more accessible and useful
  • Databases can have more then one application
  • Applications can have multiple users
  • Database Application Programs
    – Process logic specific to business need
    – Some enable data processing over Internet
  • serves as intermediary between Web server and database * responds to events * reads, inserts, modifies, deletes data
112
Q

what is a form report and queries

A
  • Forms (User Interface)
    – Used to read, insert, modify, and delete data * Reports (Output)
    – Show data in structured context
    – May compute values
  • Queries (data processing)
    – Means of getting answers from database data
113
Q

What is multi user processing

A
  • Multi-user processing is common. It is
    – The use of the system by multiple users
    – Sometime simultaneously * Unique problems
    – Lost-update problem
    – Locking used to coordinate activities of multiple users
  • creates new set of problems – Data conflicts produce inaccurate results
114
Q

what is the difference between an enterprise and personal DBMS

A
  • Enterprise DBMS
    – Process large organizational and workgroup databases
    – Supports multi-users * e.g. DB2, MS SQL, Oracle, MySQL
  • Personal DBMS
    – Designed for smaller, simpler database applications
    – Supports fewer users (2 to 20 is common)
  • e.g. Access, dBase, FoxPro, Paradox, R:Base
115
Q

what is normalized tables

A
  • First Normal Form
  • No table may have repeating columns that contain the
    same kind of data * All columns must contain only one value * There must be a primary key that uniquely defines
    rows * It basically deals with redundancy of data across a
    horizontal row
  • Second Normal Form
  • It deals with redundancy of data in vertical columns
  • To achieve 2NF, your tables must already be in 1NF
  • Identify any columns that repeat their values across
    multiple rows * Those columns need to be placed in their own table
    and reference by a key value in the original table * Look for attributes in the table that aren’t dependent
    on the primary key
  • Third Normal Form
  • You may not even need to do anything with your database for
    3NF * Look for data in your tables that’s not fully dependent on the
    primary key, but dependent on another value in the table * For example component of address can be seen as not being
    directly related to the user. Street relies on Zip code, which
    relies on city; and the city relies on the state
  • In this case, to satisfy 3NF, the address must be split into 3
    more tables containing Zip, Cities, and States. This will
    prevent misspelling but is it necessary? * 3NF may create more tables than you will want to manage.
    It is up to you to decide where to stop * However, must at least satisfy the 2NF * Make sure that the same value is not stored in more than
    one place
115
Q

what is normalized tables

A
  • Referential integrity rules
  • Used by RDMS to ensure relationships between tables remain consistent
  • Entity-relationship diagram
    – Used by database designers to document the data model
    – Illustrates relationships between entities – Caution: If a business doesn’t get data model right, system
    won’t be able to serve business well
116
Q

what can you do with content

A
  • RETRIEVE: locate and obtain required data
  • STORE: save new data so it can be found
  • MODIFY: change existing data
  • DELETE: delete existing data
    – All this should be done efficiently, that is: with an acceptable level of resource
    use
117
Q

what are the two transaction processing concepts

A
  • An Entity:
    A thing whose status is relevant to the operation and management of
    the organization
  • An Event:
    A change (transaction) in the status of at least one entity
118
Q

what is big data

A
  • Massive sets of unstructured/semi-structured data from Web traffic, social
    media, sensors, and so on
  • Petabytes, exabytes of data
  • Volumes too great for typical DBMS
  • Can reveal more patterns and anomalies
119
Q

what are analytical tools

A
  • Analytical tools: Relationships, patterns, trends
    – Tools for consolidating, analyzing, and providing access to vast amounts of
    data to help users make better business decisions
  • Multidimensional data analysis (OLAP)
  • Data mining
  • Text mining
  • Web mining
120
Q

what are managerial data issues

A
  • Content: What data should be collected?
  • Access: What data should be given to what users?
  • Logical structure: How will the data be organized to make sense to a
    particular user?
  • Physical organization: Where will the data actually be located?

establishing an information policy

Ensuring data quality

data quality audit

Data cleaning

121
Q

what is establishing information policy

A

– Firm’s rules, procedures, roles for sharing, managing, standardizing
data – Data administration
* Establishes policies and procedures to manage data
– Data governance
* Deals with policies and processes for managing availability, usability, integrity, and security of data, especially regarding government regulations
– Database administration
* Creating and maintaining database

122
Q

what is ensuring data quality

A

– More than 25 percent of critical data in Fortune 1000 company
databases are inaccurate or incomplete
– Redundant data
– Inconsistent data
– Faulty input
– Before new database in place, need to:
* Identify and correct faulty data
* Establish better routines for editing data once database in operation

123
Q

what is a data quality audit

A
  • Data quality audit:
    – Structured survey of the accuracy and level of completeness of the
    data in an information system
  • Survey samples from data files, or
  • Survey end users for perceptions of quality
124
Q

what is data cleansing

A
  • Data cleansing
    – Software to detect and correct data that are incorrect, incomplete,
    improperly formatted, or redundant – Enforces consistency among different sets of data from separate
    information systems