click below
click below
Normal Size Small Size show me how
Final CIS300
| Moore’s Law | cost of data communications and data storage is essentially zero |
| Abstract Reasoning | Construct a conceptual model |
| Systems Thinking | Model system components of how components inputs and outputs relate to one another. |
| Collaboration | Develop ideas and plans with others. Provide and receive critical feedback. |
| Ability to Experiment | Create and test promising new alternatives, consistent with available resources. |
| information system | A group of components that interact to produce information. |
| Five component Framework of Information system | Hardware, Software, Data , Procedures, People. |
| Goal of MIS | Align IS to achieve business goals and objectives |
| Management Information Systems | Development and use of information systems. Achieving business goals and objectives |
| Information system (IS) | IT + procedures + people (these produce information). is an assembly of hardware, software, data, procedures, and people that produces information. |
| Information Technology (IT) | refers to products, methods, inventions, and standards that are used for the purpose of producing information. |
| Business Process | A network of activities, resources, facilities, and information that interact to achieve some business function. |
| Activities | collections of related tasks that receive inputs and process those inputs to produce outputs. Are in rectangle. |
| Decisions | a question that can be answered yes or No. They provide branching points within the flow of a business process. Decision are in diamonds. |
| Roles | are sets of procedures. They are in ellipses |
| Resources | are people, facilities, or computer programs that are assigned to roles. are in scrolls |
| Repository | is a collection of business record. |
| data flow | is the movement of data item from one activity to another activity or to a repository. |
| Information | is knowledge derived from data. |
| data | defined as recorded facts or figures. |
| Characteristic of Good information | Accurate, Timely, Relevant, just barely sufficient, and worth its cost. |
| Egocentric Thinking | centers on self; someone who engages in egocentric thinking considers his view as the real view |
| Empathetic thinking | Consider their view as one possible interpretation of the situation and actively work to learn what other people are thinking. |
| Five Forces that determine industry | Supplier, New vendors, Customers, substitute vendors, and Rivalry. |
| Value | amount of money a customer is willing to pay for a resource, product, or service |
| Margin | difference between value an activity generates and cost of that activity |
| Value chain | a network of value-creating primary and support activities |
| Primary activites | are business functions that relate directly to the production of the organizations's products or services. |
| Support activities | are business functions that assist and facilitate the primary activities. |
| database | is a self describing collection of integrated records. |
| byte | is a character of data |
| columns | a group of bytes. also called fields |
| Rows | group of fields, aka records. |
| File | group of rows or records. Aka table |
| Metadata | collection of tables plus relationships among the rows in those tables. it describes the structure of the database. Self describing collection of integrated records. |
| Key | is a column or group of columns that identifies a unique row in a table. |
| Foreign keys | are keys of different table than the one in which they reside. |
| Relational databases | databases that carry their data in the form of tables and that represent relationship using foreign keys. |
| Database management system | Program that creates, processes, and administers databases |
| queries | Means of getting answers from database data |
| Forms | used to read, insert, modify and delete data. |
| Enterprise DBMS | Processes large organizational and workgroup databases Supports many users (thousands plus) |
| loss update problem | Occurs when two or more transactions select same record at same time, then update it based on values last received |
| Personal DBMS | Designed for smaller, simpler database applications Supports fewer than 100 users (mostly 1–10 users) |
| Business intelligence(BI) | information containing patterns, relationships, and trends. |
| Business intelligence system | is an information system that provides information for improving decision making. |
| Reporting systems | integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing. |
| Data mining systmes | process data using sophisticated statistical techniques, such as regression analysis and decision tree analysis. |
| Market-basket analysis | is another data mining system, which computes correlations of items on past orders to determine items that are frequently purchased together. |
| Knowledge management(KM)systems | create value from intellectual capital by collecting and sharing human products, products uses, with who ever needs it. |
| Experts systems | encapsulate the knowledge of human experts in the form of if/then rules. |
| granularity | refers to the degree of summarization or detail |
| clickstream data | capturing clicking behavirs. |
| Data warehouse | is to extract and clean data from operational systems and other sources and to store and catalog that data fro processing by BI tools. |
| Data Mart | Collection of data created to address needs of a particular business function, problem, opportunity. |
| Data mining | application of statistical techniques to find patterns and relationships in body of data for purpose of classification, prediction and association. |
| Systems Development | Process of creating and maintaining information systems |
| Systems development life cycle | is the traditional process used to develop information systems. |
| test plan | consists of sequences of actions that users will take when using the new systems. |
| system conversion | pilot, phased, parallel, plunge |
| pilot | Implement entire system in limited portion of business Advantage: Limits exposure to business if system fails |
| phased | System installed in phases or modules Each piece is installed and tested |
| parallel | Complete new and old systems run simultaneously Very safe, but expensive |
| plunge | High risk if new system fails, no fall back system Only used if new system not vital to company operation |
| tangible benefits | those for which the dollar value can be computed |
| drive-by sniffers | simply take computers with wireless connections through an area and search for unprotected wireless network. |
| Unauthorized data disclosure | inadvertent release of data in violation of policy |
| Pretexting | pretending to be someone else via phone call |
| Phishing | pretexting using email |
| Spoofing | disguising as a different IP address or different email sender |
| IP spoofing | impersonating another computing system |
| Sniffing | intercepting computer communications |
| Email spoofing | synonym for phishing |
| Hacking | occurs when a person gains unauthorized access to a computer systems. |
| Malware | Viruses, worms, Trojan horses, spyware, and adware |
| Virus | Computer program that replicates itself; take unwanted and harmful actions |
| Macro virus | Attach themselves to word, excel, or other types of document; virus infects every file an application creates or processes |
| Worm | Virus propagates using Internet or other computer network; can choke a network |
| Spyware | Some capture keystrokes to obtain user names, passwords, account numbers, and other sensitive information. Other spyware supports marketing analyses |
| Adware | Can slow computer performance |
| Structured decision | is one for which there is an understood and accepted method for making the decision |
| Unstructured decision | is one for which there is no agreed on decision making methods |
| Automated information systme | are those in which the hardware and software components do most of the work |
| Augmentation information system | are those in which humans do the bulk of work |
| Knowledge Management (KM) | Process of creating value from intellectual capital and sharing that knowledge with others. |
| Content Management Systems | Information systems that track documents, web pages, graphics and related material |
| Discussion groups | Post questions and queries online Organize discussions as FAQs |
| Team portals | Publish information about team activities |
| Blogs | a personal journal that is accessible on the web,usually publicly so. |
| Podcasts | Audio and video digital files uploaded to web |
| Expert systems shells | the programs that process a set of rules |
| spreadsheet | is a table of data having rows and columns |
| Entities | Person, place, event, thing Something users want to track Order, customer, salesperson, item, volunteer, donation |
| Attributes | Describe characteristics of an entity OrderNumber, CustomerNumber, VolunteerName, PhoneNumber |
| Identifier | Attribute that uniquely identifies one entity instance from other instances Student_ID_Number |
| Normalization | Converting poorly structured tables into two or more well-structured tables |
| Database marketing | Application of business intelligence systems for planning and executing marketing programs |
| RFM | analyzes and ranks customers according to their purchase patterns |
| Decision tree | Hierarchical arrangement of criteria that predict a classification or value |
| Support | is probability that two items will be purchased together |
| lift | the ratio of confidence to the base probability of buying an item |
| Confidence | conditional probability of buying. |
| Reporting systems | Create meaningful information from different data sources |
| Report Management | Defines who receives what reports, when, what format, and by what means |
| Report authoring | connect to data sources, create report structure, format report. |
| OLAP analytical processing | is a reporting technology that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. |
| OLAP servers | Developed to perform OLAP analysis |
| COBIT (Control Objectives for Information and Technology) | Set of standard practices often used in assessment stage of BPM cycle |
| Encapsulation | places logic for a service in one place and all other services go to it for service |
| WSDLs | Language that services can use to describe what they do and how other computer programs can access their feature |
| Work-Breakdown Structure | Hierarchy of tasks required to complete a project |
| Critical Path Analysis | Sequence of activities that determine earliest completion date |
| enterprise resource planning | Which of the following is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform? |