Textbook Flashcards

1
Q

What does ‘process aware’ mean?

A

To be process aware means to view their actions in regards to the larger business process and to think about how they can improve the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a business process/system?

A

A series of tasks/activities/actions/steps designed to produce a product or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the 4 components of a business process?

A

Activities - Manual actions (people following procedures), automated or controlled procedures done by a computer or some combination of the two.

Resources - Items of value (people working, cash, inventory etc).

Facilities - Structures used within the the business process. Resources can be stored in them Eg. factories, filing cabinets, pieces of equipment, truck and in the case of digital resources data bases and inventories can be included

Information - Activities use information to to determine how to transform inputs received into outputs produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the 4 categories of the business process would suppliers and and customers fit into?

A

Resources because they provide value to the business process. They are not considered activities because they are an external part of the process and not under direct control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is information?

A

data presented in meaningful context, knowledge derived from data, processed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characteristics must information have to be useful?

A

It must be timely, relevant, just barely sufficient (not too much so as to overwhelm) and worth its cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 decision making levels?

A

Operational, Managerial and strategic levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are operational decisions? what is the IS called that supports these?

A

day to day activities such as ordering more stock, deciding who to extend credit to, which invoices should we pay today? etc. The IS supporting these is called transaction processing systems (TPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are managerial decisions? What is the IS called that supports them?

A

These concern the allocation and utilization of resources. eg how much should we budget for computers next year? how many people should we assign to x project? How much warehouse space will we need next year? etc. The IS that supports managerial decisions is called Management information systems (MIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are strategic decisions?

A

Concerns broader organizational issues. Eg, Should we start a new product line? Should we open a new centralized warehouse? Should we acquire company A?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between a structured decision and an unstructured decision?

A

A structured decision is one with a understood and and accepted method for making the decision. eg a formulated ordering of new stock. an unstructured decision is one with no agreed upon decision making method. Prediction method varies from person to person. eg, hiring or deciding future of company etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between efficiency and effectiveness?

A

efficiency - “doing things right”. using just the right amount of resources to to complete the job satisfactorily.
effectiveness - “doing the right things” improving or offering new goods and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a value chain?

A

A network of activities that improve the effectiveness of of a good or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is backward and forward integration?

A

backward integration is when a business who deals with a good moves a step back in the value chain ie a coffee store starts growing it’s ow coffee or a car dealership starts manufacturing it’s own cars. forward integration is when a business moves forward one step in the value chain ie a mining company starts cutting and and finishing their own diamonds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are primary activities?

A

activities which directly add value to the product. eg shipping materials, designing, manufacturing the product etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are support activities?

A

Activities that indirectly add value to the product eg paying the workers, maintenance, management etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the 5 forces model?

A

There are 5 competitive forces that determine industry profitability; bargaining power of customers, threat of substitution, bargaining power of suppliers, threat of new entrants and rivalry among existing firms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is diffusion of innovation?

A

The process by which an innovation is communicated through certain channels over time by the members of a social system. It happens in 5 stages; 1. knowledge 2 persuasion 3. decision 4. implementation 5. confirmation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a cache?

A

A cache is of very fast memory that stores frequently used instructions. larger cache = faster computer but more expensive. Stored in CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does volatile refer to when talking about memory?

A

volatile memory refers to the cache and main memory both of which are lost when the power goes off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What’s the difference between Horizontal and Vertical market applications?

A

Horizontal market applications are general programs used across many different organizations and industries. eg power point, excel etc. Vertical market applications are designed for one specific industry eg dentistry or mechanics and fix a niche problem. they are often customized or tailored to a specific firm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is firmware?

A

software that is installed into devices such as printers, controllers etc. It i installed in read only memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is BIOS?

A

Basic input/output system that is used when the computer is first booted up. It is required because all volatile memory is lost when the computer is unpowered so the BIOS offers instructions to restart etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Whats the difference between thin and thick clients?

A

thin and thick refer to the amount of codethat must run on the client computer. applications that require nothing but a browser are considered thin where as thick may have some othrer part downloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is content?

A
  • Difficult to define
  • Something of value and can be considered an asset. - — Related to intellectual property
  • depends on industry
  • examples include pictures, account info or words
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why are content management systems important?

A

HElp organizations ensure that data collected is acurate, organized and presentable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a database?

A

A self describing collection of integrated records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a key?

A

A key is a column that identifies a unique row within the database/spreadsheet. necessary for every database table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are foreign keys?

A

keys from another table than the one they are found in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are relational databases?

A

tables that represent relationships using foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is meta data?

A

data that describes other data. eg notes about data or a table or a column that explains the data type. included in every database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a database application?

A

A collection of forms, reports, queries and application programs. May have multiple applications per database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the lost update problem in database management systems?

A

When 2 or more users are accessing th database information inputted from one can be lost if they are trying to both input to the same table etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the 5 components of an information system in order?

A

Hardware, Software, Data Procedures, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the components of a LAN?

A

Switch, NIC, unsheilded twisted pair cable

36
Q

What extra component does a WLAN need?

A

It needs a router as well as computers with WNIC

37
Q

What is a NIC?

A

Network interface card - connects a computers circuitry to the network cable

38
Q

Why is mobile computing important?

A

furthers e-commerce, convenience of use,

39
Q

What are functional systems?

A

they facilitate the the work of a single department or business function. ie operational, accounting, HR or sales systems

40
Q

What are cross functional systems?

A

functional systems that have been integrated with other functional systems throughout a firm.

41
Q

What are inter-organizational systems?

A

cross functional systems that span 2 or more organizations

42
Q

What is PIPEDA and what does it do?

A

Personal Information Protection and Electronic Documents Act
-intended to balance an individual’s right to privacy of personal info which organizations need to collect/use/share for business ie governs how data is collected and used, info can only be used for the purpose it was gathered for, responsibility for organization to protect the data

43
Q

3 sources of security problems are what?

A

HUman error and mistakes, Malocious Human activity and Natural events and disasters

44
Q

What are the 5 types of security problems? What categories of security problems does each fall into?

A
  1. Unauthorized data disclosure
  2. Incorrect data modification
  3. Faulty service
  4. Denial of service
  5. Loss of infrastructure
    All 5 can fall into each category
45
Q

What are 4 examples of malicious release of Unauthorized data ?

A

Pretexting - occurs when someone decieves by pretending to be someone else via telephone
Phishing - similar to pretexting but uses email instead of phone
spoofing - Someone pretending to be someone else
Sniffing - technique for intercepting computer communications

46
Q

What is faculty recovery action?

A

When data is incorrectly stored after a disaster

47
Q

What are 3 examples of faculty service security problems?

A
  1. problems that result of sytems working incorrectly or incorrect data modification
  2. Usurpation - occurs when unauthorized programs invade a computer system and replace legitimate programs
  3. mistakes made from recovery of natural disasters
48
Q

What are 3 examples of Denial of service attacks?

A
  1. Human error or lack of procedures that cause service to be denied
  2. DOS attack ie malicious hacker floods web server so it can not service legit requests
  3. Natural disasters cause systems to fail
49
Q

What is the biggest risk for loss infrastructure ?

A

Natural disaster such as earthquake

50
Q

What are the 3 elements of a good security program?

A
  1. Senior management involvement to establish security policy and balance costs and benefits of security program
  2. Safeguards to protect against various threats, safeguards involve hardware, software, data, procedures and people
  3. incident response plan to be readiy in case of any future security incidents
51
Q

What are 4 technical safeguards? give an example for each.

A
  1. Identification and authorization (smart cards, passwords/username biometric system etc)
  2. Encryption using a key to decrypt encrypted messages ( Symmetric or Asymmetric keys for {each party has the same key or there is 2 different ones, one that is public and one that is private}, SSL/TLS, digital signatures or certificates.
  3. Firewalls - prevents unauthorized network access. (hardware or software based)
  4. Malware protection (antivirus/spyware programs)
52
Q

What are 6 ways to prevent malware?

A
  1. install antivirus and anti-spyware programs
  2. scan hard drive and email frequently
  3. update malware definitions
  4. Open e-mail attachments only from known sources
  5. install software updates promptly
  6. browse only reputable sites
53
Q

What does a data administration do?

A

Organization wide administration that develpos data policies and enforces data standards

54
Q

What is a database administration?

A

Makes procedures for multi-user processing, changes to control structure, and protects database

55
Q

What are 5 data safegaurds?

A
  1. Data rights and responsibilities ( enforced by user accounts authenticated by passwords)
  2. Data encryption
  3. Backup and recovery procedures
  4. Physical security ( lock and controll access to facility, maintain entry log etc)
  5. Third party contracts (safeguards written into contracts, right to inspect premises and personnel)
56
Q

What are 5 sample recovery strategies and their description?

A
  1. Work area recovery (WAR) - Office space pre-configured with office equipment at a recovery facility. (usually available for monthly fee)
  2. Cold site - A room or building used for recovery but not set up for immediate use. Made for long term interruptions
  3. Hot Site - A recovery location that is available 24-7. Applications and sytems running all the time or can be started within 2 hours
  4. Relocate - short term solution is to move to toher company branches etc to resume work
  5. Shut down - temporarily halt all non essential activities
57
Q

What is an enterprise architect?

A

Blueprint of an organizations information systems and the management of these systems by considering: organizational objectives, business processes, databases, information flows, software, supporting technology

58
Q

What is reach-range framework?

A

reach refers to the extent an organization is integrated and range refers to the type of functionality of applications

59
Q

What is the Zachman framework?

A

6 reasons for communication what-data, how-function, where-network, who-people, when-time,why-motivation
stakeholder groups - planner, owner, designer, builder, implementer and worker

60
Q

What is IT alignment?

A

Process of matching organization methods with IT architecture

61
Q

What are the 5 ways to acquire software?

A
  1. Buy it as is
  2. Buy it and customize it
  3. Rent or lease it
  4. Build it yourself
  5. Outsource it
62
Q

What is IT operations responsible for?

A

maintaining the current IT infrastructure via delivery of service, maintenence, protection and management of IT infrastructure

63
Q

What are IT projects for?

A

renewing and adapting to kwwp IT working effectively in the future. Responsible for changing the system rather than maintaining it.

64
Q

What are 4 dimensions of success for an IT project?

A
  1. Resource constraint - meets time and budget criteria
  2. Impact on customers: Customer receives significant value
  3. Business success - how high and long are the profits from the project?
  4. Prepare the future: Impacts made so that future business success and customer impact more likely
65
Q

What is SDLC?

A

System development life cycle - classic process used to acquire IS. The phases where IS is planned, analyzed, designed, implemented and maintained

66
Q

What are the 5 phases of the System development Life cycle?

A
  1. Systems definition - Why should the system be built? (defined by managers)
  2. Requirement analysis - what should the system do? Identify features and functions
  3. Component design - How will it be built? based on approved user requirements
  4. Implementation - Put it in action: implement, test and install new system
  5. System maintenance: Fix and upgrade, add new features, maintain etc
67
Q

What are 4 considerations for assessing feasibility of a project?

A

Cost, Schedule, Technical, and organization

68
Q

What are some considerations for Requirement analysis of IT projects?

A

System requirements, scope of project, specific features and functions ie required inputs and outputs

69
Q

What are considerations for component design of IT projects?

A
  1. Hardware - designed determined by project team
  2. Software - Design depends on source ( off the shelf, with alterations etc)
  3. Data - converted to database design
  4. Procedures - developed for normal processing, backup and failure recovery operations
    Job description - created for users and operations personnel
70
Q

What are the considerations for implementation of IT projects?

A

Component construction, documentation and review, System testing and integration. Users must be converted to the knew system

71
Q

What kinds of system conversion are there?

A

Parallel - new system runs with the old one during testing ( expensive)
Phased - installed in phases and tested after each phase (cant be used in tightly integrated systems)
Pilot - Organizations implement entire system on single limited unit ( if unit fails it only affects that one unit, reduces exposure)
Plunge - Direct installation of new and discontinuation of old (risky)

72
Q

What are the problems with SDLC?

A

Waterfall method - phases are no supposed to be repeated ( though often teams need to)
Difficulty in documenting requirements - paralysis by analysis
Scheduling and budget difficulties - multiyear projects difficult to schedule, estimations difficult to get accurate

73
Q

Why would a company outsource IT/IS?

A
  1. gain expertise ( specialists)
    B. reduce costs ( part time services, economies of scale)
    - reduce risks
74
Q

What are outsourcing risks?

A
  1. Loss of control
  2. Benefits can be outweighed by long term costs ie high unit cost forever
  3. No easy exit ( critical knowledge in minds of vendors)
75
Q

What’s the difference between Merchant companies and Non-Merchant companies?

A

Merchant companies - Own the goods they sell, Buy goods and then resell them, sell the services they provide
Non merchant comapnies - arrange for the purchase and sale of goods without ever owning them, sell services provided by others

76
Q

What are examples of merchant and non merchant companies?

A

merchant - B2C, B2B, B2G

Non merchant - Auctions ( Ebay), Clearinghouses ( Ebay, Amazon), exchanges (stock)

77
Q

What are the benefits of e-commerce?

A

Greater market efficiency via:

  • Disintermediation and increased information and terms.
  • Knowledge of price elasticity ( losing bidder auction prices, Price experimentation, more accurate info obtained directly from customer)
78
Q

What are the benefits of E-commerce specific to merchants?

A
  • Overcome geographical limitiations
  • Gain new customers
  • Lower costs (real estate, employees, advertising and marketing)
  • Can create targeted communication
  • open 24/7
  • Create market for Niche products
  • Easily implment coupons and limited time offers
79
Q

What are the benefits of E-commerce specific to customers?

A

Eliminate travel and costs

  • increased convenience
  • Easy comparison shopping
  • Locate unique products faster
  • Less reliance/loyalty on favourite vendor
80
Q

What are the issues with E-commerce?

A

Channel conflice - B2B may compete with B2B customers
Price conflict with traditional channels - manufacturer selling direct to customersa at lower prices
Logistics - Processing orders in small quantities, manufacturer has to set up shipping department
Customer service expense - manufacturer selling to customer has to set up customer service department
Showrooming - Customers checking out product in store but buying online
Taxation - Where should the tax rates be based? on creation or consumption?

81
Q

How does Social Capital add value?

A

Information - transfer of knowledge in network
Influence - list of contacts to help in future endeavours
Social credentials - trust from others towards others
Personal reinforcement - Support from others in the network when needed

82
Q

What ways can you measure value of social capital?

A

Number of relationships in a social network
Strength of these relationships
Resources controlled by those related

83
Q

Why are weak links important?

A

Weak links add the greatest number of new connections to your social network

84
Q

What is web 2.0?

A

Web integration with smartphones, user created content, social networking, location and context based services, dynamic marketplaces. Ie websites that allow users to dynamically interact with it

85
Q

What 3 things do managers need to make decisions?

A

Data, info ( summarized data) and knowledge ( relationship between pieces of information and cause and effect)