click below
click below
Normal Size Small Size show me how
MIS Midterm Exam
IMportant Concepts
Question | Answer |
---|---|
What is an Information System? | It is what organizations use for some purpose- systems that involve people doing things (processes) with information (data) using information technology to help this |
What are the five components of an IS Model? | Hardware, software, Data, Procedures, people |
What is a Business Process? | A set of related activities that produce a valued output for a customer.The customer can be internal or external. |
What is the difference between a process model and a functional Model? | Processes often cut across functions. Movements between functions often causes delays or difficulties (handsoff) Who owns processes? Who thinks about them outside their own function-department. Process involve all aspects of company. Functions:Marketing |
What are organizations made up of? | Series pf processes. It is how thye do their work. |
Facts: | Most companies spend over 50% of their capital on IT-related equipment.Spend 2-10% revenue annually on IT activities. |
IS Agility | The ability to meet business needs when they need them. |
The World is Flat | The World has become a level playing field with fiber optic cables. Everyone is connected. |
Telecommunications System | This consists of hardware and software that transmits information from one location to another. |
Network | Telecommunications between computers. |
E commerce | The internet has created this. It allows us to share information and extend their marketing and distribution around the world. |
The Digital Firm | Work 24/7. At night processes are done elsewhere in the world. |
2 Types of Signals for Telecommunication | Analog and Digital signals |
Analog Signal | Was originally designed for voice and video data. Now you can send anything through any signal. Amplitude and frequency. altering characteristics of waves. First phones used this. Signal mainly for Voice. |
Digital Signals | discrete pulses that turn on and off representing a series of bits. This allows for easy transmission of information between computers. These pulses can be Copper wire:voltage change or Light pulses: Fiber optics cable. |
Advantages of Digital signals | Analog uses varying voltages or currents to represent level of wave so they can take any value within the operating range. Its hard to tell whether is an error or signal. Digital have lower error rates. Since its simpler signal, less bandwidth is needed |
Advantages of Digital Signals Part 2 | so more information can be transferred. Digital boxes for tv can provide more services. Easier to read in a network. |
Bandwidth | This is a measure of available or consumed data communication resources. This is measured in bits. |
Physical Transmission Media | Twisted wire, Coaxial cable, (television cable) Fiber optics cable and various radio frequency transitions through the air. |
Twisted wire | This is a paired twisted copper wire that was originally used for telephone systems in households for analog signals to pass through. For long distances this way is being taken over by Fiber optics. Which can carry more data lighter and more durable. |
Fiber Optic | Clear fiber strands of glass into a series of cables that light pulses through. This is the back bone of the internet as well as modern phone systems allowing high speed transfers of large amounts of data. |
Wireless transmission media | This is based on radio signals at different frequencies and transferring information. Allows people to always be in touch with other people in the company. They minimize work space and allow expansion for the companies work force. There are 3 ranges. |
Short Range Wireless Networks | This eliminates the need for wires within short proximity of computer devices. (Bluetooth) |
Medium Range Wireless Networks | These are similar to local area networks.(LAN) Most popular: Wireless Fidelity. |
LAN | Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). common communications line or wireless link. |
WiFi | This is wireless fidelity. This network connects to a transmitter with an antenna called a wireless access point. Which is then connected to a wireless LAN or Satellite which connects to the internet. Hot-spot within 90 meters. |
Wide area wireless networks | They connect people users to the internet over geographically dispersed territory. This is used by government and is monitored. More network security. Cellular radio and wireless broadband. Satellites can be used to. Satellites connect large distances. |
Cellular Radio | Cell phones use these radio waves to have two way communication. |
1G | Cellular used analogue signals which had low bandwidth. |
2G | Cells used digital signals for voice and had more bandwidth than 1G. |
3G | Cells use digital signals for voice and data and richer features to support media applications. |
4G | First all packet switching network. Supporting the next generation of multimedia like HDTV ..... |
Wimax | Worldwide interoperability for microwave access. Has a range of 50 km. Wimax antenna towers transmit signals to receiver antennas on homes and businesses. |
Circuit switched network | Circuit switching is a telecommunications technology by which two network nodes establish a dedicated communications channel (circuit) connecting them for the duration of the communication session before the nodes may communicate. Set amount bandwidth. |
Packet Switching | First for sending data between computers. Now can send any type of information. This is breaking up data into paracels of information called packets. Then they are sent via network channels as they become available and reassemble back to original file |
Lease Time of Connection | You can leease a time of connection via a fiber optic cable for a solid channel for information exchange. Permanent non switched connection. |
Packet Switching part 2 | It allows bandwidth shared equally among users. The single packets travel through the network singly. Each one contains info or origin, destination, and order of packets. Packets don't have to be in order, and all of them must be received to be assembled. |
Computer network | Collection of computers that communicate with each other. Over transition media. Can be as small as two computers sharing a printer or the internet. They are connected through transmission medium but have protocols on how to talk. |
Local Area Network | This is tow or more computer devices within limited geographical area. The ability to print in the NSC from your computer. All info broadcasted on the network restricting the size of it. |
WAN | When you receive or send information beyond your LAN you are probably using WAN. Wide are network. Usually fiber optics microwave or satelite. |
TCP/IP | This is a transmission Control Protocol/internet protocol. This is a set of protocols making it possible to create Internetworks where where various networks are joined so data can pass through. IP is rules with addressing,and TCP focus on computer connec |
Internet | This is a network of networks, networking infrastructure. Allows people to exchange data cheap and efficient across the world. Links thousands of individual networks, back bone of this is Fiber optic cables. |
IP Address | Internet protocol address each computer has their own. |
Domain Names | Theses are hard to remember so their are domain names which can be purchased. Ex commerce.queensu.ca ca:top level domain,queensu is Second level domain (company), commerce is particular machine third level domain. |
Intranet | This is a private inter network that allows the organization to share files using TCP/IP. Collaboration within the company. |
Extranets | This allows you to have limited access from an outside network to another companies intranet with permission.Supplier could log on using extranet and check info so he can make supply shipments. These have firewalls so no other information can be accessed. |
2 ways to connect parts of organization or different Companies. | Leasing lines which are secure and fast because of fiber optics. This is a permanent connection. Garenteed bandwidth. Or you can use the Internet by paying your ISP for a shared network facilities. More risky less security alot cheaper. |
Virtual private networks. (VPN) | Use internet with security devices to create appearance of a private network which is fast secure cheap and reliable. |
VPN part 2 | The VPN server will need a password to login in like com portal and then the server will exchange encrypted data to other vpn server. Only these can understand encryption. If you have a LAN and a VPS server you can login and have tunnel for data. |
Client server Computing | Links computers in a an arrangement that some machines (servers) can provide computer services for user PCs. |
Thick Clients | These are clients that have large processing and storage capacities.You can run programs even if network is down.Laptop run Office no connection to server it performs computations and stores the data in own memory with no server help. |
Thin Clients | No local storage and no limited processing power. THey rely on server because they can only get applications and possibly data from server. Example Company laptop connects to server through LAN or VPN and gets company date. Laptop stolen data lost. |
Peer to Peer Processing | Each computer is a server and a client. (DD++) |
World Wide Web | Series of protocols for accessing information on the internet. It is built on universal standard for storing receiving and displaying. client server architecture. The web is a service or client/server application that runs using TCP/IP on the internet. |
Web Continued | The web pages are based on HTML: Hypertext Markup language. which is formatting for docs pics and bids. The web pages are found by HTTP: Hyper text transfer protocol. The web allows you to view different web pages using a web browser. |
Mashups | a mashup is a web page or application that uses and combines data, presentation or functionality from two or more sources to create new services. Real estate companies showing properties on Google earth. |
RSS | Really simple sidnication. Different site like Wikipedia, or blogs, where people and upload information or contribute. |
Cloud Computing | This is following client server model. It allows you to access information and software from an external server. No you dont have to put all the data and fill your memory. Connect to a cloud or resources. so you don't have to have soft ware on system |
HAAS | Hardware as a service. You can rent hardware rather than buying it, on the internet. |
Characteristics of Good Data | Includes relevance, timeliness accuracy, correctness, completeness, and accessibility. |
Data | The raw material from which information is is generated. |
Information | This is data that has been processed and converted into a form that is relevant to the decision maker. |
Knowledge | fluid mix of framed experience, values contextual information and experts insight that provides framework for evaluation incorporating new experience and information. |
Data base platform Vendors | These groups sell high storage computers. the role of the computer is storage. IBM EMC all competitors. |
Data base software Vendors | They create software that is responsible for accessing the data DBMS (data base management system), and software that enables us to use data. |
Disadvantages to Traditional File Organization approaches | Data duplications, inconsistencies, no integration. Multiple master files of customer which is inefficient. Lack of sharing data. Lack of security. Transferring important docs from dep to dep is risky. |
DBMS | is software taht allows an organization to create, maintain, and provide controlled access to a user database. Once the base has been filled with data people can gain access to it through DBMS. Multiple applications can access this information. |
Data Base | Self describing shared collections of integrated data designed to meet the needs of an organization. Minimize redundancy, more consistent data, provides platform for accessibility and sharing data. |
DBMS Continued | It acts as an intermediary between the data and the applications and users that need it. |
Entities | Things of value to a company. Like sales that they want to collect. Customer names. Customer is an entity |
Attributes | There are the attributes and characteristics of the Entity. Stored in table. The actual name and actual address given stored in table. |
Record | This is an instance of an entity.Id numbers. or dates.In the records are primary keys to eliminate confusion |
Fields | These are where the different attributes are stored in tables. like name, and address.. |
Relational Database Management System | This is a simple concept of tables that capitalize on the characteristics of records(rows), and and Fields(Columns). It allows them to group data by their common attributes. |
Primary keys | are important in Relational Databases. They can group the data from different charts like student numbers at queens. |
Forms | Are used to allow people to enter data in a formatted matter for the data base. |
Reports | Application pulls data out of the data base that is relevant to show. |
Queries | This is asking the data base question For example what sales were made at a particulur store greater than $2000. Teacher could as computer to print report of Richie Tam to find final grade. Then the computer will extract data from Relational Data Base. |
Distributed Data | stores data in various computers connected through a network, rather than just through a computer.This can be handy for businesses with multiple locations that all want to access information. |
Distributed Data Part 2 | It will scan databases in the network then replicate and duplicate the data in the databases. |
Transactional Data Bases | They deal with structured data from ongoing operational activities. Ex transactions with customers and buyers. |
Operational Database | where firms enter the everyday operations and transactions of an organization. This is where they enter gather and store, and retrieve company specific information. This is a kind of Transactional Data Base. |
Analytical Data Bases | Its used to generate more value from your data using analytical techniques like data mining. |
Data ware house | Is a collection of historical data organized by subject to enhance decision making. It comes from all the differner operation data bases like sales, marketing .... |
Data Mart | Smaller mor affordable version of a data ware house. This is oriced at $100,000 rather then $1,000,000. |
Content Management Systems | These are databases used by organizations to mange their digital assets and work flow. |
Document Management System | This is a kind of content management system that is used for managing documents and images. sued for reviving destroying etc of docs. Have encryption for security |
Object Orientated Databases | These are becoming increasingly popular because they facilitate the management of multimedia components used in web applications which are typically pieces of information from several sources. |
OODB continued | The object oriented database can take information tables from relational databases and save them as images and objects. |
Data Mining | Is the process of extracting hidden patterns from data. Could be how much we sold of product 201 last year to volatility of the stock. |
Input Technologies | Accepts the data and converts them to a form the computer can understand. |
Processing | The central processing unit(CPU) carries out instructions, manipulates data and controls tasks performed by other components of the computer (intel micro processor an memory) |
Output Technologies | Present the data/information in a new way so people can understand it. |
Storage | Stores data/information for future use (DVD, Hard drives) |
The CPU | This is the central processing unit. The brain of the computer. Made up microscopic transmitters on silicone chip, along with main memory. |
CPU part 2 | Intel Core, Celeron. the CPU selects instructions, processes them, performs arithmetic and logical comparisons and stores results of operation in memory(main or secondary) |
control unit | This reads the instructions and controls the flow of data going to the various parts of the computer system. |
arithmetic logical unit | performs all mathematical calculations and performs logical comparisons with data. |
Binary Form | This is the form that data must be translated to in order for the CPU to read it. Its in 1s, and 0s. Example words are turned into bits to be stroed inside computer. |
Main Memory | This is also known as primary storage or RAM, contains data to be processed and instructions for The processor of how to process the data, and operating system instructions that manage various aspects of the computers operations. |
Main memory | The memory is in silicone chips mounted on the motherboard allowing for faster processing. All data instructions in main memory are volatile.(computer off, instructions gone) RAM: Random access memory. |
Main Memory | When you use exel part of program is copied to the main memory for easier access. |
Bus | This is what connects the main memory to the Micro processor. These are a set of wires that allow information to pass between two components. Buses are also used in other parts of the computer to connect secondary HD to the CPU. |
Secondary storage | This is non volatile memory. Content survives when computer is turned off. Usually stored in ways that are not electrical but still binary. There are 3 types |
Magnetic | These are high in amounts of storage, and are in many computers but not very portable. |
Optical | This is disks like DVD where its stored using laser technologies. |
Flash (solid state) | This is starting to over take the other storage devices. They have better shock resistance and are in many Ipods. Their are no moving parts in it. Good for mobility.Although info is saved as electric signals the electrons done discharge when power is cut. |
Cashe Memory | Term used to describe high speed memory that enables the computer to temporarily store blocks of data instructions between two devices for speed advantages. Cache |
Cache Memory part 2 | connecting the processor and the main memory would be located closer to the processor to make it faster. The chips in cache would be able to respond faster than the main memory. New instructions can be sent faster from cash then from main memory. |
Cache Memory part 3 | You can have this between computer devices as well which speed up the overall processes by saving previous instructions in the cache for faster access. Cost of memory increases as speed does. |
Bits | This is what all computer data is broken down to. which are grouped into bytes: 8bit sets. This can represents anything in a computer phots data. |
Input Devices | This is a technology used to enter instructions into the computer. Keyboards and mouse are most common. Other things are what we plug in. That give instructions like scanners sound Microphones. |
RFID | Radio Frequency identification. This is a chip that can be located and it has its own identification number. This can be used for measuring levels of inventory or tracking shipments in trucks. Their are wireless chip scanners and manual scanning as well. |
Output Devices | these allow you to see information processed by the computer. Binary code to things you can see here and touch. |
Supercomputers | The most expensive powerful computers that are mainly used by very wealthy companies or for scientific research. |
Mainframe Computers | These are scaled down versions of the super computers but are still very powerful. ebay uses these and they can still handle thousands of transactions a day. |
Workstations | Engineers and Finance use these workstations. have high performance calculative abilities. Process large amount of info quickly |
Micro Computers | Smallest and most inexpensive category of computer. These are for personal use. Desktops notebooks or tablets smart phones ipads...... |
Computer Software | This is made up of computer programs, which are series of instructions for the computer. Building these requires writing code known as programing. Syntax writing skills. |
System Software | These are a set of instructions that serve as an intermediary between computer hardware and application software. This loads when you first turn on your computer. has rudimentary instructions to run computer and for parts of the computer to run. Windows |
Application Software | it allows the user to create something of business value (exel) It contains sets of instructions read by the computer hardware. The instuction make it possible for us to create information with application software. |
Application Software II | Input your data and instruction and the computer processes it into business value. |
Horizontal Market application | This is a software that provides capabilities across all organizations. and industries. Usually standardized for ease in sharing files. Microsoft Office. |
Vertical Market Application | This is a software the pertains more to a specific industry. For example dentists need programing that keeps customer information and billing applications. |
Open source Software | This is software that is not private but is programed by the public and being constantly modified. Firefox is an example of this. It is low cost and high quality but the users use at own risk with no automatic support systems. Usually the prgrams are $0 |
Utilities Computing | On demand computing, a service provider makes computing resources and infrastructures (hardware/software) available to customer as needed. They charge customers based on their usage rates which saves the company on IT costs. |
Grid Computing | It allows groups to share their their unused resources to tackle large computational projects. Often used by pharmaceutical companies in speeding up testing processes from years to months. |
Grid Computing Part 2 | This is now aplciable for corparations who want to form virtual organizations with other companies to share computer processing power. Soft ware is also allowing us to do the same internally. |