(PM) Information Management Flashcards
What are the five components that make up an information system?
hardware, software, data, people, process
What are three examples of information system hardware?
There are a number of possible answers: a PC, a printer; a mouse, tablets, mobile phones, etc.
Microsoft Windows is an example of which of the five components of information systems?
It is an operating system, which is a part of the software component.
What is application software?
Software that does something useful.
What (job) roles do people play in information systems?
For example; helpdesk support, systems analyst, programmer; and CIO.
What is the definition of a process?
A process is a series of steps undertaken to achieve a desired outcome or goal.
What was invented first, the personal computer or the Internet (ARPANET)?
The Internet was activated in 1969; the personal computer was introduced in 1975.
What does it mean to say we are in a “post-PC world”?
The personal computer is no longer the primary way that people interact and do business with.
What is Carr’s main argument about information technology?
That information technology is just a commodity and cannot be used to gain a competitive advantage.
Write your own description of what the term information systems hardware means.
Answers will vary, but should say something about information systems hardware consisting of the physical parts of computing devices that can actually be touched.
What is the impact of Moore’s Law on the various hardware components described in this chapter?
The student should pick one of the components and discuss the impact of the fact that computing doubles in speed every two years. Most devices are getting smaller; faster; cheaper, and this should be indicated in the answer.
What is integrated computing?
Computing technology that is integrated in other objects. Think about cars, bicycles, bridges, airplanes, etc.
Explain why the personal computer is now considered a commodity.
The PC has become commodity in the sense that there is very little differentiation between computers, and the primary factor that controls their sale is their price.
The CPU can also be thought of as the …. of the computer.
Brain
List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz.
kilohertz, megahertz, gigahertz
What is the bus of a computer?
The bus is the electrical connection between different computer components.
Name two differences between RAM and a hard disk.
RAM is volatile; the hard disk is non-volatile. Data access in RAM is faster than on the hard disk.
What are the advantages of solid-state drives over hard disks?
The main advantage is speed: an SSD has much faster data-access speeds than a traditional hard disk.
How heavy was the first commercially successful portable computer?
The Compaq PC was 28 pounds.
Come up with your own definition of software. Explain the key terms in your definition.
A variety of answers are possible, but should be similar to the definition in the text: Software is the set of instructions that tell the hardware what to do. Software is created through the process of programming.
What are the functions of the operating system?
The operating system manages the hardware resources of the computer, provides the user-interface components, and provides a platform for software developers to write applications.
Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds.
Microsoft Excel (application), Google Chrome (application), iTunes (application), WIndows (operating system), Android (operating system), Angry Birds (application)
What is your favorite software application? What tasks does it help you accomplish?
Students will have various answers to this question. They should pick an application, not an operating system. They should be able to list at least one thing that it helps them accomplish.
What is a “killer” app?
A killer app is application software that is so useful that people will purchase the hardware just so they can run it.
What was the killer app for the PC?
The killer app for the PC was the spreadsheet (Visicalc).
How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.
There are various ways to answer this question. Students should identify that there are mobile operating systems and mobile apps. Most likely, students will break down mobile apps into multiple categories: games, GPS, reading, communication, etc.
Explain what an ERP system does.
An ERP (enterprise resource planning) system is a software application with a centralized database that is implemented across the entire organization. As the name suggests ERP systems are usually used to plan the resources that a firm has available.
What is open-source software? How does it differ from closed-source software? Give an example of each.
Open-source software is software that makes the source code available for anyone to copy, contribute to and use. It is free to download, copy, edit and distribute. Closed-source software does not make the source code available and generally is not free to download, copy, and distribute. There are many examples of both, such as: Firefox (open source), Linux (open source), iTunes (closed source), Microsoft Office (closed source).
What does a software license grant?
Software licenses are not all the same, but generally they grant the user the right to use the software on a limited basis. The terms of the license dictate users rights in detail.
How did the Y2K (year 2000) problem affect the sales of ERP systems?
Organizations purchased ERP software to replace their older systems in order to avoid any problems with the year 2000 in their software.
What is the difference between data, information, and knowledge?
Data are the raw bits and pieces of facts and statistics with no context. Data can be quantitative or qualitative. Information is data that has been given context. Knowledge is information that has been aggregated and analyzed and can be used for making decisions.
Explain in your own words how the data component relates to the hardware and software components of information systems.
There are numerous answers to this question, but all should be variations on the following: Data is processed by the hardware via software. A database is software that runs on the hardware. Hardware stores the data, software processes the data.
What is the difference between quantitative data and qualitative data? In what situations could the number 42 be considered qualitative data?
Quantitative data is numeric, the result of a measurement, count, or some other mathematical calculation. Qualitative data is descriptive. The number 42 could be qualitative if it is designation instead of a measurement, count, or calculation. For example: that player’s jersey has number 42 on it.
What are the characteristics of a relational database?
A relational database is one in which data is organized into one or more tables. Each table has a set of fields, which define the nature of the data stored in the table. A record is one instance of set of fields in a table. All the tables are related by one or more fields in common.
When would using a personal DBMS make sense?
When working on a smaller database for personal use, or when disconnected from the network.
What is the difference between a spreadsheet and a database? List three differences between them.
A database is generally more powerful and complex than a spreadsheet, with the ability to handle multiple types of data and link them together.
Some differences:
- A database has predefined field types, a spreadsheet does not.
- A database uses a standardized query language (such as SQL), a spreadsheet does not.
- A database can hold much larger amounts of data than a spreadsheet.
Describe what the term normalization means.
To normalize a database means to design it in a way that: 1) reduces duplication of data between tables and 2) gives the table as much flexibility as possible.
Why is it important to define the data type of a field when designing a relational database?
A data type tells the database what functions can be performed with the data. The second important reason to define the data type is so that the proper amount of storage space is (pre-)allocated for the data.
Name a database you interact with frequently. What would some of the field names be?
The student can choose any sort of system that they interact with, such as Amazon or their school’s online systems. The fields would be the names of data being collected, such as “first name”, or “address”
What is metadata?
Metadata is data about data. It refers to the data used to describe other data. such as the length of a song in iTunes, which describes the music file.
Name three advantages of using (and developing) a data warehouse.
The text lists the following (the student should pick at least three of these):
i. The process of developing a data warehouse forces an organization to better understand the data that it is currently collecting and, equally important, what data is not being collected.
ii. A data warehouse provides a centralized view of all data being collected across the enterprise and provides a means of determining data that is inconsistent.
iii. Once all data is identified as consistent, an organization can generate one version of the truth. This is important when the company wants to report consistent statistics about itself, such as revenue or number of employees.
iv. By having a data warehouse, snapshots of data can be taken over time. This creates a historical record of data, which allows for an analysis of trends.
v. A data warehouse provides tools to combine data, which can provide new information and analysis.
What is data mining?
Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions.
What were the first four locations hooked up to the Internet (ARPANET)?
UCLA, Stanford, MIT, and the University of Utah
What does the term packet mean?
A fundamental unit or block of a total amount of data that is transmitted over the Internet. Each packet has the sender’s address, the destination address, a sequence number, and a piece of the overall data to be sent.
Which came first the Internet or the World Wide Web?
the Internet
What was revolutionary about Web 2.0?
Anyone could post content to the web, without the need for understanding HTML or web-server technology.
What was the so-called killer app for the Internet?
electronic mail (e-mail)
What makes connection a broadband connection?
A broadband connection is defined as one that has speeds of at least 256,000 bps (0.256mbps).
What does the term VoIP mean?
Voice over Internet protocol -a way to have voice conversations over the Internet.
What is an LAN?
An LAN is a local network, usually operating in the same building (e.g. at home) or on the same campus (or firm).
What is the difference between an intranet and an extranet?
An intranet consists of the set of web pages and resources available on a company’s internal network. These items are not available to those outside of the company. An extranet is a part of the company’s network that is made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers inventory levels.
What is Metcalfe’s Law?
Metcalfe’s Law states that the value of telecommunications network is proportional to the square of the number of connected users of the system.
Define confidentiality
i. Confidentiality: restricting access to those who are allowed to see given information.
Define integrity
ii. Integrity: the assurance that the information being accessed has not been altered and truly represents what is intended.
Define availability
iii. Availability: information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.
What does the term authentication mean?
The process of ensuring that a person is who he or she claims to be.
What is multi-factor authentication?
The use of more than one method of authentication. The methods are: something you know, something you have, and something you are.
What is role-based access control?
With role-based access control (RBAC), instead of giving specific users access rights to an information resource, users are assigned to roles and then those roles are assigned the access.
What is the purpose of encryption?
To keep transmitted data secret so that only those with the proper key can read it.
What are two good examples of a complex password?
There are many examples of this. Students need to provide examples of passwords that are a minimum of eight characters, with at least one upper-case letter one special character; and one number.
What is a firewall?
A firewall can be either a hardware firewall or a software firewall. A hardware firewall is a device that is connected to the network and filters the packets based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.
What does the term physical security mean?
Physical security is the protection of the actual hardware and networking components that store and transmit information resources.