Summery Flashcards
What are the components of an information system?
Technology (hardware, software, networks), people, and processes. These components work together to transform data into useful information.
Define systems thinking.
A holistic approach that considers the entire system, its components, and how they work together, focusing on inputs, processes, and outputs.
What is the difference between IT and IS?
IT (Information Technology) is a subset of IS (Information Systems). IT includes technology components, whereas IS integrates technology, people, and processes to transform data into information.
What are the characteristics of valuable information?
Accessible, consistent, complete, timely, accurate, cost-effective, relevant, and clear.
Explain the DIKW pyramid.
Back:
Data: Raw facts.
Information: Processed data with context and relevance.
Knowledge: Insight derived from information, facilitating action.
Wisdom: Deep understanding and application of knowledge.
What is the role of information systems in organizations?
To support decision-making, improve processes, enhance productivity, and integrate functions across the organization.
Name three types of software and their purposes.
Operating Systems: Interface between hardware and applications (e.g., Windows, macOS).
Application Software: Performs tasks (e.g., Excel, Photoshop).
Enterprise Software: Manages organizational functions (e.g., ERP systems).
Define big data and its importance.
Big data refers to extremely large datasets that are difficult to process with traditional tools. It enables insights and decision-making through advanced analytics.
What are Porter’s Five Forces?
Competitive rivalry.
Threat of new entrants.
Threat of substitutes.
Bargaining power of buyers.
Bargaining power of suppliers.
What is a competitive advantage?
A unique strength or position that allows an organization to outperform its competitors, often achieved through innovation, efficiency, or differentiation.
What are the types of competitive strategies according to Porter?
Cost leadership.
Differentiation.
Focus (niche market targeting).
Define the value chain and its purpose.
The value chain outlines primary and support activities in a business to identify areas where value can be added to achieve competitive advantage.
What are the main components of a computer’s hardware?
Input devices (keyboard, mouse).
Processing unit (CPU).
Storage (HDD, SSD).
Output devices (monitor, printer).
Communication devices (network cards).
What is the purpose of a database?
To organize, store, and retrieve data efficiently, enabling informed decision-making.
What is the difference between client-server and peer-to-peer networks?
Client-server: Centralized structure where a server provides resources to clients.
Peer-to-peer: Decentralized structure where all nodes share resources equally.
What are the components of the information security triad?
Confidentiality: Preventing unauthorized access.
Integrity: Ensuring data accuracy and reliability.
Availability: Ensuring authorized access when needed.
What is cybercrime, and give two examples.
Illegal activities conducted using computers or networks.
Examples: Phishing, ransomware.
What is the Systems Development Life Cycle (SDLC)?
A process for planning, creating, testing, and deploying information systems, typically including:
Planning.
Analysis.
Design.
Implementation.
Maintenance.
What is the difference between explicit and tacit knowledge?
Explicit: Easily communicated and documented (e.g., manuals).
Tacit: Intuitive and experience-based, difficult to articulate (e.g., skills, insights).
What is SaaS (Software as a Service)?
A software distribution model where applications are hosted by a provider and accessed online (e.g., Google Workspace).
Explain the concept of e-commerce.
Buying and selling goods or services over the internet, including B2B, B2C, C2C, and B2G models.
What is business process re-engineering (BPR)?
A strategy to analyze and redesign workflows and processes to improve efficiency and effectiveness.
What are the four types of decision-making in organizations?
Strategic (long-term).
Tactical (mid-term).
Operational (short-term).
Ad-hoc (situational).
What is blockchain technology?
A decentralized ledger system used to securely record transactions across multiple systems, best known for cryptocurrency.
What are the key differences between a traditional and flat organizational structure?
Traditional: Hierarchical, with clear layers of authority.
Flat: Fewer management layers, promoting collaboration and speed in decision-making.
What are examples of tools for business intelligence (BI)?
Data warehouses.
Dashboards.
Analytics software (e.g., Tableau, Power BI).
Define enterprise resource planning (ERP) systems.
Integrated systems used to manage core business processes in real-time, using a unified database.
What are the roles of CIO and CTO?
CIO: Oversees the overall IS strategy and ensures alignment with business goals.
CTO: Focuses on technological innovation and infrastructure.
What is the importance of data hierarchy in databases?
It organizes data into levels (e.g., bits, fields, records, files, databases), ensuring clarity and efficiency in data management.
Define cloud computing.
Delivering computing services (e.g., servers, storage, databases) over the internet, offering scalability, efficiency, and cost reduction.
What are the primary goals of business intelligence (BI)?
Support better decision-making.
Identify trends and patterns.
Provide actionable insights.
What is the primary function of firewalls in cybersecurity?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
What is the difference between a primary key and a foreign key in databases?
Primary Key: Uniquely identifies records in a table.
Foreign Key: Establishes relationships between tables by referencing a primary key.
What are three main types of e-commerce?
B2B (Business-to-Business).
B2C (Business-to-Consumer).
C2C (Consumer-to-Consumer).
What are some examples of input and output devices?
Input: Keyboard, scanner, microphone.
Output: Monitor, printer, speakers.
What is the purpose of a feasibility study in SDLC?
To assess the practicality and potential success of a proposed project in terms of technical, economic, and operational aspects.
What is phishing?
A cyberattack that uses deceptive emails or websites to steal sensitive information like passwords or credit card numbers.
Define “big data analytics.”
The process of examining large datasets to uncover patterns, correlations, and insights for decision-making.
What are the three levels of decision-making in organizations?
Strategic: Long-term, top-level decisions.
Tactical: Mid-level planning and control.
Operational: Day-to-day execution and processes.
What is the purpose of normalization in databases?
To organize data efficiently, minimize redundancy, and improve data integrity.
What are the advantages of open-source software?
Cost-effective.
Flexible and customizable.
Community support and collaboration.
Define intellectual property (IP) in the context of IS.
Creations of the mind (e.g., software, designs) that are protected legally to prevent unauthorized use.
What is the function of a virtual private network (VPN)?
To create a secure, encrypted connection over the internet, protecting data from interception.
What is the relationship between a transaction processing system (TPS) and an ERP?
TPS captures and processes day-to-day transactions, while ERP integrates this data for organization-wide access and analysis.
Define “data warehouse.”
A central repository of integrated data from multiple sources, used for analysis and reporting.
What is a denial-of-service (DoS) attack?
A cyberattack that overwhelms a system, making it inaccessible to users.
What are examples of enterprise software?
ERP (Enterprise Resource Planning).
CRM (Customer Relationship Management).
SCM (Supply Chain Management).
Describe batch processing vs. real-time processing.
Batch: Data processed in groups at specific times.
Real-time: Data processed immediately as it is entered.
What is an imitation-resistant value chain?
A business strategy integrating unique processes or resources that are difficult for competitors to replicate.
Define the concept of “digital divide.”
The gap between individuals or groups in access to or knowledge of digital technologies.
What is machine learning in the context of AI?
A subset of AI that enables systems to learn and improve from data without explicit programming.
What is “blockchain” commonly used for?
Securely recording transactions, often used in cryptocurrency and supply chain tracking.
What are the primary risks of relying heavily on technology?
System failures.
Cybersecurity threats.
Overdependence reducing adaptability.
What is SaaS, and how is it different from traditional software?
SaaS is subscription-based and accessed online, unlike traditional software that is installed locally.
What is the purpose of a business continuity plan?
To ensure critical operations can continue or recover quickly after a disruption.
What is the main goal of a cybersecurity policy?
To establish guidelines and practices for protecting organizational data and systems.
Define “enterprise systems.”
Large-scale software solutions used to manage and integrate core business processes.
What are “smart devices”?
Devices connected to a network, capable of sharing and processing data (e.g., IoT devices).
What are examples of ethical concerns in IS?
Data privacy.
Intellectual property theft.
Digital surveillance.
What is the primary role of a project manager in IS?
To ensure projects are completed on time, within budget, and meet objectives.
What are key features of blockchain technology?
Decentralization.
Transparency.
Security through cryptography.
Define “knowledge management system” (KMS).
A system that facilitates the organization and sharing of organizational knowledge.
What is a “digital business landscape”?
The dynamic environment shaped by advancements in digital technology impacting businesses and consumers.
What are the three categories of cybersecurity tools?
Prevention tools (e.g., firewalls).
Detection tools (e.g., intrusion detection systems).
Response tools (e.g., recovery software).
Define customer relationship management (CRM).
A system that manages a company’s interactions with current and potential customers, enhancing customer satisfaction and loyalty.
What are examples of tacit knowledge?
Insights, skills, and experiences that are difficult to document, such as leadership skills or creative intuition.
What is the main difference between a public and private cloud?
Public Cloud: Shared infrastructure managed by third-party providers.
Private Cloud: Dedicated infrastructure for a single organization.
What is “encryption” in cybersecurity?
The process of converting data into a coded format to protect it from unauthorized access.
Define “decision support system” (DSS).
A computer-based system that supports managerial decision-making by providing relevant information and analysis tools.
What is social engineering in the context of cybersecurity?
Manipulating individuals into divulging confidential information through deception or psychological tactics.
What is the role of an information security officer?
To develop and oversee the implementation of security policies to protect organizational data.
What are the types of intellectual property protection?
Copyrights.
Patents.
Trademarks.
Trade secrets.
Define “smart contracts.”
Self-executing contracts with terms directly written into lines of code, typically used with blockchain technology.
What are the stages of the technology adoption curve?
Innovators.
Early adopters.
Early majority.
Late majority.
Laggards.
What is the difference between structured and unstructured data?
Structured: Organized, easy to search (e.g., databases).
Unstructured: Not organized, harder to analyze (e.g., videos, emails).
Define “SCM” (Supply Chain Management).
A system managing the flow of goods, information, and finances through the supply chain to optimize efficiency.
What are the benefits of cloud computing?
Scalability.
Cost efficiency.
Accessibility.
Disaster recovery.
What is “Moore’s Law”?
The observation that the number of transistors on a microchip doubles approximately every two years, increasing computing power.
What is ERP’s main advantage?
It integrates all business processes into a unified system, improving efficiency and decision-making.
Define “data mining.”
The process of analyzing large datasets to discover patterns, correlations, or trends for decision-making.
What is phishing, and how can it be prevented?
A cyberattack that tricks individuals into revealing sensitive information. Prevention includes user education, anti-phishing software, and vigilant email monitoring.
What are examples of disruptive technologies?
AI and machine learning.
Blockchain.
Internet of Things (IoT).
3D printing.
Define “enterprise architecture.”
A framework that aligns business processes and IT infrastructure to support an organization’s goals and strategy.
What is the difference between a LAN and a WAN?
LAN (Local Area Network): A network confined to a small geographic area.
WAN (Wide Area Network): A network spanning large geographic areas.
What are the components of a database management system (DBMS)?
Database engine.
Query language.
Reporting tools.
Data storage.
What is the “triple constraint” in project management?
Time, cost, and scope; balancing these constraints is critical for project success.
What are the types of wireless networks?
Back:
PAN (Personal Area Network).
LAN (Local Area Network).
MAN (Metropolitan Area Network).
WAN (Wide Area Network).
Define “data governance.”
Policies and processes ensuring data quality, security, and proper management within an organization.
What are examples of mobile application software?
Messaging apps (e.g., WhatsApp).
Productivity apps (e.g., Google Docs).
Navigation apps (e.g., Google Maps).
What is the purpose of an SLA (Service Level Agreement)?
To define the level of service a provider must deliver, including performance metrics and responsibilities.
Define “cyber resilience.”
The ability of an organization to prepare for, respond to, and recover from cyberattacks.
What is “shadow IT”?
IT systems or solutions used within an organization without explicit approval from the IT department.
What is the main function of a DNS (Domain Name System)?
To translate human-readable domain names into IP addresses.
Define “agile methodology.”
A flexible software development approach emphasizing collaboration, iteration, and adaptability.
What is a zero-day vulnerability?
A security flaw that is exploited before the vendor has released a patch or fix.
What is “green computing”?
Practices and technologies to reduce environmental impact of IT, such as energy-efficient hardware and recycling.
What is the purpose of a digital signature?
To verify the authenticity and integrity of a message, document, or software using encryption.
Define “robotic process automation” (RPA).
Technology that uses software robots to automate repetitive tasks.
What are the risks of IoT devices?
Security vulnerabilities.
Data privacy concerns.
Lack of standardization.
What is the difference between data integrity and data security?
Data Integrity: Accuracy and consistency of data.
Data Security: Protection of data from unauthorized access or breaches.