Summery Flashcards
What are the components of an information system?
Technology (hardware, software, networks), people, and processes. These components work together to transform data into useful information.
Define systems thinking.
A holistic approach that considers the entire system, its components, and how they work together, focusing on inputs, processes, and outputs.
What is the difference between IT and IS?
IT (Information Technology) is a subset of IS (Information Systems). IT includes technology components, whereas IS integrates technology, people, and processes to transform data into information.
What are the characteristics of valuable information?
Accessible, consistent, complete, timely, accurate, cost-effective, relevant, and clear.
Explain the DIKW pyramid.
Back:
Data: Raw facts.
Information: Processed data with context and relevance.
Knowledge: Insight derived from information, facilitating action.
Wisdom: Deep understanding and application of knowledge.
What is the role of information systems in organizations?
To support decision-making, improve processes, enhance productivity, and integrate functions across the organization.
Name three types of software and their purposes.
Operating Systems: Interface between hardware and applications (e.g., Windows, macOS).
Application Software: Performs tasks (e.g., Excel, Photoshop).
Enterprise Software: Manages organizational functions (e.g., ERP systems).
Define big data and its importance.
Big data refers to extremely large datasets that are difficult to process with traditional tools. It enables insights and decision-making through advanced analytics.
What are Porter’s Five Forces?
Competitive rivalry.
Threat of new entrants.
Threat of substitutes.
Bargaining power of buyers.
Bargaining power of suppliers.
What is a competitive advantage?
A unique strength or position that allows an organization to outperform its competitors, often achieved through innovation, efficiency, or differentiation.
What are the types of competitive strategies according to Porter?
Cost leadership.
Differentiation.
Focus (niche market targeting).
Define the value chain and its purpose.
The value chain outlines primary and support activities in a business to identify areas where value can be added to achieve competitive advantage.
What are the main components of a computer’s hardware?
Input devices (keyboard, mouse).
Processing unit (CPU).
Storage (HDD, SSD).
Output devices (monitor, printer).
Communication devices (network cards).
What is the purpose of a database?
To organize, store, and retrieve data efficiently, enabling informed decision-making.
What is the difference between client-server and peer-to-peer networks?
Client-server: Centralized structure where a server provides resources to clients.
Peer-to-peer: Decentralized structure where all nodes share resources equally.
What are the components of the information security triad?
Confidentiality: Preventing unauthorized access.
Integrity: Ensuring data accuracy and reliability.
Availability: Ensuring authorized access when needed.
What is cybercrime, and give two examples.
Illegal activities conducted using computers or networks.
Examples: Phishing, ransomware.
What is the Systems Development Life Cycle (SDLC)?
A process for planning, creating, testing, and deploying information systems, typically including:
Planning.
Analysis.
Design.
Implementation.
Maintenance.
What is the difference between explicit and tacit knowledge?
Explicit: Easily communicated and documented (e.g., manuals).
Tacit: Intuitive and experience-based, difficult to articulate (e.g., skills, insights).
What is SaaS (Software as a Service)?
A software distribution model where applications are hosted by a provider and accessed online (e.g., Google Workspace).
Explain the concept of e-commerce.
Buying and selling goods or services over the internet, including B2B, B2C, C2C, and B2G models.
What is business process re-engineering (BPR)?
A strategy to analyze and redesign workflows and processes to improve efficiency and effectiveness.
What are the four types of decision-making in organizations?
Strategic (long-term).
Tactical (mid-term).
Operational (short-term).
Ad-hoc (situational).
What is blockchain technology?
A decentralized ledger system used to securely record transactions across multiple systems, best known for cryptocurrency.
What are the key differences between a traditional and flat organizational structure?
Traditional: Hierarchical, with clear layers of authority.
Flat: Fewer management layers, promoting collaboration and speed in decision-making.
What are examples of tools for business intelligence (BI)?
Data warehouses.
Dashboards.
Analytics software (e.g., Tableau, Power BI).
Define enterprise resource planning (ERP) systems.
Integrated systems used to manage core business processes in real-time, using a unified database.
What are the roles of CIO and CTO?
CIO: Oversees the overall IS strategy and ensures alignment with business goals.
CTO: Focuses on technological innovation and infrastructure.
What is the importance of data hierarchy in databases?
It organizes data into levels (e.g., bits, fields, records, files, databases), ensuring clarity and efficiency in data management.
Define cloud computing.
Delivering computing services (e.g., servers, storage, databases) over the internet, offering scalability, efficiency, and cost reduction.
What are the primary goals of business intelligence (BI)?
Support better decision-making.
Identify trends and patterns.
Provide actionable insights.
What is the primary function of firewalls in cybersecurity?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
What is the difference between a primary key and a foreign key in databases?
Primary Key: Uniquely identifies records in a table.
Foreign Key: Establishes relationships between tables by referencing a primary key.
What are three main types of e-commerce?
B2B (Business-to-Business).
B2C (Business-to-Consumer).
C2C (Consumer-to-Consumer).
What are some examples of input and output devices?
Input: Keyboard, scanner, microphone.
Output: Monitor, printer, speakers.
What is the purpose of a feasibility study in SDLC?
To assess the practicality and potential success of a proposed project in terms of technical, economic, and operational aspects.
What is phishing?
A cyberattack that uses deceptive emails or websites to steal sensitive information like passwords or credit card numbers.
Define “big data analytics.”
The process of examining large datasets to uncover patterns, correlations, and insights for decision-making.
What are the three levels of decision-making in organizations?
Strategic: Long-term, top-level decisions.
Tactical: Mid-level planning and control.
Operational: Day-to-day execution and processes.
What is the purpose of normalization in databases?
To organize data efficiently, minimize redundancy, and improve data integrity.