click below
click below
Normal Size Small Size show me how
Final CIS300
Moore’s Law | cost of data communications and data storage is essentially zero |
Abstract Reasoning | Construct a conceptual model |
Systems Thinking | Model system components of how components inputs and outputs relate to one another. |
Collaboration | Develop ideas and plans with others. Provide and receive critical feedback. |
Ability to Experiment | Create and test promising new alternatives, consistent with available resources. |
information system | A group of components that interact to produce information. |
Five component Framework of Information system | Hardware, Software, Data , Procedures, People. |
Goal of MIS | Align IS to achieve business goals and objectives |
Management Information Systems | Development and use of information systems. Achieving business goals and objectives |
Information system (IS) | IT + procedures + people (these produce information). is an assembly of hardware, software, data, procedures, and people that produces information. |
Information Technology (IT) | refers to products, methods, inventions, and standards that are used for the purpose of producing information. |
Business Process | A network of activities, resources, facilities, and information that interact to achieve some business function. |
Activities | collections of related tasks that receive inputs and process those inputs to produce outputs. Are in rectangle. |
Decisions | a question that can be answered yes or No. They provide branching points within the flow of a business process. Decision are in diamonds. |
Roles | are sets of procedures. They are in ellipses |
Resources | are people, facilities, or computer programs that are assigned to roles. are in scrolls |
Repository | is a collection of business record. |
data flow | is the movement of data item from one activity to another activity or to a repository. |
Information | is knowledge derived from data. |
data | defined as recorded facts or figures. |
Characteristic of Good information | Accurate, Timely, Relevant, just barely sufficient, and worth its cost. |
Egocentric Thinking | centers on self; someone who engages in egocentric thinking considers his view as the real view |
Empathetic thinking | Consider their view as one possible interpretation of the situation and actively work to learn what other people are thinking. |
Five Forces that determine industry | Supplier, New vendors, Customers, substitute vendors, and Rivalry. |
Value | amount of money a customer is willing to pay for a resource, product, or service |
Margin | difference between value an activity generates and cost of that activity |
Value chain | a network of value-creating primary and support activities |
Primary activites | are business functions that relate directly to the production of the organizations's products or services. |
Support activities | are business functions that assist and facilitate the primary activities. |
database | is a self describing collection of integrated records. |
byte | is a character of data |
columns | a group of bytes. also called fields |
Rows | group of fields, aka records. |
File | group of rows or records. Aka table |
Metadata | collection of tables plus relationships among the rows in those tables. it describes the structure of the database. Self describing collection of integrated records. |
Key | is a column or group of columns that identifies a unique row in a table. |
Foreign keys | are keys of different table than the one in which they reside. |
Relational databases | databases that carry their data in the form of tables and that represent relationship using foreign keys. |
Database management system | Program that creates, processes, and administers databases |
queries | Means of getting answers from database data |
Forms | used to read, insert, modify and delete data. |
Enterprise DBMS | Processes large organizational and workgroup databases Supports many users (thousands plus) |
loss update problem | Occurs when two or more transactions select same record at same time, then update it based on values last received |
Personal DBMS | Designed for smaller, simpler database applications Supports fewer than 100 users (mostly 1–10 users) |
Business intelligence(BI) | information containing patterns, relationships, and trends. |
Business intelligence system | is an information system that provides information for improving decision making. |
Reporting systems | integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing. |
Data mining systmes | process data using sophisticated statistical techniques, such as regression analysis and decision tree analysis. |
Market-basket analysis | is another data mining system, which computes correlations of items on past orders to determine items that are frequently purchased together. |
Knowledge management(KM)systems | create value from intellectual capital by collecting and sharing human products, products uses, with who ever needs it. |
Experts systems | encapsulate the knowledge of human experts in the form of if/then rules. |
granularity | refers to the degree of summarization or detail |
clickstream data | capturing clicking behavirs. |
Data warehouse | is to extract and clean data from operational systems and other sources and to store and catalog that data fro processing by BI tools. |
Data Mart | Collection of data created to address needs of a particular business function, problem, opportunity. |
Data mining | application of statistical techniques to find patterns and relationships in body of data for purpose of classification, prediction and association. |
Systems Development | Process of creating and maintaining information systems |
Systems development life cycle | is the traditional process used to develop information systems. |
test plan | consists of sequences of actions that users will take when using the new systems. |
system conversion | pilot, phased, parallel, plunge |
pilot | Implement entire system in limited portion of business Advantage: Limits exposure to business if system fails |
phased | System installed in phases or modules Each piece is installed and tested |
parallel | Complete new and old systems run simultaneously Very safe, but expensive |
plunge | High risk if new system fails, no fall back system Only used if new system not vital to company operation |
tangible benefits | those for which the dollar value can be computed |
drive-by sniffers | simply take computers with wireless connections through an area and search for unprotected wireless network. |
Unauthorized data disclosure | inadvertent release of data in violation of policy |
Pretexting | pretending to be someone else via phone call |
Phishing | pretexting using email |
Spoofing | disguising as a different IP address or different email sender |
IP spoofing | impersonating another computing system |
Sniffing | intercepting computer communications |
Email spoofing | synonym for phishing |
Hacking | occurs when a person gains unauthorized access to a computer systems. |
Malware | Viruses, worms, Trojan horses, spyware, and adware |
Virus | Computer program that replicates itself; take unwanted and harmful actions |
Macro virus | Attach themselves to word, excel, or other types of document; virus infects every file an application creates or processes |
Worm | Virus propagates using Internet or other computer network; can choke a network |
Spyware | Some capture keystrokes to obtain user names, passwords, account numbers, and other sensitive information. Other spyware supports marketing analyses |
Adware | Can slow computer performance |
Structured decision | is one for which there is an understood and accepted method for making the decision |
Unstructured decision | is one for which there is no agreed on decision making methods |
Automated information systme | are those in which the hardware and software components do most of the work |
Augmentation information system | are those in which humans do the bulk of work |
Knowledge Management (KM) | Process of creating value from intellectual capital and sharing that knowledge with others. |
Content Management Systems | Information systems that track documents, web pages, graphics and related material |
Discussion groups | Post questions and queries online Organize discussions as FAQs |
Team portals | Publish information about team activities |
Blogs | a personal journal that is accessible on the web,usually publicly so. |
Podcasts | Audio and video digital files uploaded to web |
Expert systems shells | the programs that process a set of rules |
spreadsheet | is a table of data having rows and columns |
Entities | Person, place, event, thing Something users want to track Order, customer, salesperson, item, volunteer, donation |
Attributes | Describe characteristics of an entity OrderNumber, CustomerNumber, VolunteerName, PhoneNumber |
Identifier | Attribute that uniquely identifies one entity instance from other instances Student_ID_Number |
Normalization | Converting poorly structured tables into two or more well-structured tables |
Database marketing | Application of business intelligence systems for planning and executing marketing programs |
RFM | analyzes and ranks customers according to their purchase patterns |
Decision tree | Hierarchical arrangement of criteria that predict a classification or value |
Support | is probability that two items will be purchased together |
lift | the ratio of confidence to the base probability of buying an item |
Confidence | conditional probability of buying. |
Reporting systems | Create meaningful information from different data sources |
Report Management | Defines who receives what reports, when, what format, and by what means |
Report authoring | connect to data sources, create report structure, format report. |
OLAP analytical processing | is a reporting technology that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. |
OLAP servers | Developed to perform OLAP analysis |
COBIT (Control Objectives for Information and Technology) | Set of standard practices often used in assessment stage of BPM cycle |
Encapsulation | places logic for a service in one place and all other services go to it for service |
WSDLs | Language that services can use to describe what they do and how other computer programs can access their feature |
Work-Breakdown Structure | Hierarchy of tasks required to complete a project |
Critical Path Analysis | Sequence of activities that determine earliest completion date |
enterprise resource planning | Which of the following is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform? |