click below
click below
Normal Size Small Size show me how
IS Final
| Question | Answer |
|---|---|
| Two branches of IT | Architecture and Infrastructure |
| What does architecture do? | Translates strategy to plans for IS and strategy becomes the blueprint for the IS |
| What does the infrastructure do? | The actual technologies that support the flow and processing of ino |
| What are the business objectives of IS? | Achieving operational excellence, developing new products and services, attaining customer service, improving decision making, promoting competitive advantage, ensuring survival |
| Five basic business entities | Suppliers, customers, employees, invoices, products and services |
| Four basic business functions | Manufacturing, sales and marketing, finance, hr |
| Examples of hospitality systems GDS CRS ERS | Global distribution system- hotels flights cars books and sells. central Reservation System- Used by chains to coordinate reservations for company. Electronic Reservation System- Propertly level reservation system |
| Computers are measured in | FLOPS floating point operations per second |
| standalone computer for a specific purpose | workstation |
| handles hundreds of users simultaneously | mainframe |
| smaller version of mainframe | minicomputer |
| File storage or computer that processes HTMAL pages | Server |
| Fastest mainframe | supercomputer |
| software program that emultates hardware | virtual machine |
| federal law to limit the collection and use of personal info about children by the operators of Internet services and web sites. 1998 | Children's Online Privacy Protection Act |
| policies, procedures, and tools for managing the retention, destruction, and storage of electronic records | Electronic Records Management |
| Five Moral Dimensions of the Info Age | Information rights, property rights, accountability and control, system quality, quality of life |
| governs the privacy and security of health info records | HIPAA |
| financial institutions to provide each consumer with a privacy notice | Gramm-Leach-Billey Act |
| protects investors from the possibility of fraudulent accounting activities by corporations | Sarbanes-Oxley Act |
| intended for streamlining US companies compliance with EU Drive | Internal Safe Harbor Polici |
| Intellectual property aspects: | Trade secrets, copyrights, patents, challeges DMCA and file sharing |
| any violations of criminal law that involve the knowledge of computer technology for their perpetration, investigation, or prosecution | Computer crime |
| Identity theft means: | phishing, evil twins, pharming, computer abuse |
| Malicious software designed to replicate itself by coping itself into the other programs | virus |
| malicious software that replicates itself by filling all of the storage space | worm |
| Malcious software that appears to be legitimate but is designed to destruct | Trojan horse |
| malsof sends info about web surfing habits | spyware |
| malsof runs invisibly in background to record keystrokes | Key logger |
| malsof set of programs that subvert control of the OS can conceal | Rootkit |
| uses programming skills to gain illegal access to a computer network or file | Hacker |
| Uses low-level hacker skills | Cracker |
| Theft of data and attacks on servers people and government | Cyber vandalism |
| faking the sending address of a transmission | spoofing |
| intercepting and logging traffic passing over a digital network | sniffing |
| assault on a network causing slow down or stoppage of communication | Denial of Service Attack |
| large number of compromised computers used to DOS attack | Botnet |
| cracking techniques that rely on weaknesses in wetware to trick people into revealing info | social-engineering |
| How can you secure a wireless network? | use Virtual Private Network tech, Wi-Fi alliance, Extensible Authentication Protocol |
| How can you access control to protect company data? | Authentication, access token, smart cards, biometric authentication |
| a combination of hardware and software that prevents unauthorized users from accessing private networks | Firewall |
| Monitor hot spots on corporate networks to detect and deter intruders | Intrusion Detection Systems |
| Software check computers for the presence of malware | Antivirus and antispyware |
| activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities to access the functions | business continuity |
| How can you ensure business continuity? | Downtime, fault-tolerant computer systems, high-availability computing, recovery-oriented computing, disaster recovery planning |
| Business continuity measure designed to prevent failures due to hardware | Fault-tolerant computer systems |
| Business continuity measure designed for multiprocessing systems that can quickly recover from a failure | High-availability computing |
| Business continuity measure that recovers based on redundancy | Recovery-oriented computing |
| Business continuity planning and securing outsourcing componenet of continuity | Disaster recovery planning |
| Example of info system to collect and process data on company employees | HRIS |
| Term that describes how well an infrastructure component can adapt to increased demands? | Scalability |
| Long term goals | Business stratefy |
| A company's purpose | Mission |
| Specific actionable goal for use of tech | IS Goal |
| 1st step of IS org change | Informate |
| IS org change 2nd step | Automate |
| Info used to make projections in an org | Business Intelligence |
| Plan of org to provide info services to customers | IS strategy |
| Form of social context directly influences info system | immediate context |
| Interdependence of a system leads to | Systemic Effects |
| Moore predicted microprocessor would double every | 2 years |
| What may not match an org's current work processes and data | Off the shelf software |
| What is not an advantage of open source software | Support available only online comm of core development |
| Traditional systems development life cycle, users are limited to | providing info requirements |
| How many bytes in a giga | 1,000,000,000 |
| Develop systems based on producing deliverables often which grow incrementally from one deliverable to anuther until final is complete | Iterative |
| T or F: Computers can run any type of program regardless of memory | False |
| T or F: Prototyping allows user to clarify info requirements as they use prototype | True |
| T or F: SDLC used to determine if a project should be pursued and focuses on investigation and planning | False |
| Computer Technologies become obsolete faster or slower than others? | Faster |
| Limited small inexpensive computers | Minicomputer |
| Running application from a network server or downloading software from a network is called | cloud computing |
| Event management process, when and where step? | Organize |
| A comp that executes demands requested by a webserver to fetch data from database | Application Server |
| In System Design of SDLC, the continual enhancement of requirements of a project during system construction | Score Creep |
| Type of conversion when a unit o an org is chosen for trial? | Pilot |
| Concurrent use of processing and data storage resources ofmany computers to a single problem | Grid computing |
| Most processing power computers | Super |
| Electronic storage device without moving parts | Flash Memory Drives |
| T or F: SLDC is used to determine if a project should be pursued and focuses on the investigation and planning aspects only | False |
| T or F: JAD is like RAD except JAD is more integrally involed with users | True |
| T or F: Most management info systems use sophisticated math models and stats | False |
| T or F: If you only have a little time, use RAd not JAD | True |
| Method of systems development is expensive and often applied to entreprise wide installation of systems | SDLC |
| What files can exist in POS functional system? | Transaction, process, management reporting |
| What is not a part of systems analysis? | Hardware and software choice |
| Backbone, main system for org | PMS |
| System that contains a range of interfaces to include Local Area Networks, metropolitan area networks to wide area networks with global tech capacity | CRS Central Reservations System |
| Development process is the traditional method for all steps required to build an IS | SDLC |
| Systems used for purchase of material resource available through supply chain in hospitality | Inventory and purchasing system |
| Type of architecture that software applications are created by combining self-contained software services that communicate with each other | SOA |
| Software used to connect processes in one or more cmps in a network, website connection to database | Middleware |
| STR client groups | Hotel ops and real estate investors |
| Comp system that performs and records daily dealings to conduct business | Transaction level system |
| 4 aspects IS infrastructure | hardware, software, network, data components |
| 3 pieces of data STR collects | Rooms Available, Rooms Sold, Rooms Revenue |
| Collects data from various key usiness processes and stores the data in one comprehensive data repository, usable by other parts | Entreprise system |
| Infrastructure component employs a large central computer that could handle functionality of IS | Mainframe |
| Business of selling a product | POS |
| Systems used for purchase of material resource through supply chain | Procurement |
| System contains range of hardware LANS MANS WANS with capacity for global | CRS central reservations system |
| Not a part of problem solving process | Solution info change |
| Smallest to largest byte system | Kilo Mega Giga Tera Peta Exa |
| Self contained services that communicate with eachother to create a working soft app | SOA |
| SDLC systems development stage that determines how info system will do what is needed | System design |
| Plan an org uses to provide info service to customers | Info Strategy |
| Software whose source code is available at no cost | Open Source |
| Amount and type of memory affects all but | cost of processing data |
| Phase of SDLC includes specification for IS | System Design |
| Number of servers work on a network to complete a business process, while a number of other servers work on another | Multitiered client server network |
| Process of running old csystem concurrently with new system is what conversion? | Parallel |
| T or F: Internet advertising grows at more than 70% per year | False |
| T or F: No assembly for entreprise | False |
| T or F: Infrastructure always before architecture | False |
| Primary purpose of POS system | Transaction processing |
| Designed to process document request and repository for data | Web server |
| CRM stands for | Customer relationship management |
| Grid computing is a form of | distributed computing |
| Type of entreprise storage system that is an architecture for building ddicated networks for access to storage | Storage area network |
| Not function of PMS | Car rental |
| Key actors in immediate environment | Regulations |
| Weather and planets on what comp | Super |
| Form of secondary storage laser disk | Optical storage |