adms 2511 midterm prep

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/106

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

what is an information system

A system that collects, processes, stores, analyzes, and disseminates information for a specific purpose.

2
New cards

What are the five components of an information system?

Hardware, software, database, network, and people.

3
New cards

What is a Decision Support System (DSS)?

Interactive system for complex, non-routine decision-making.

4
New cards

What is an Executive Information System (EIS)?

Provides summarized data and trends for senior executives.

5
New cards

What is Enterprise Resource Planning (ERP)?

Integrated system that unifies all departments on one platform.

6
New cards

What are Functional Area Information Systems (FAIS)?

Systems designed for specific business functions (e.g., HR, accounting, marketing).

7
New cards

what is an example of SIS?

fed ex real time package tracking system

8
New cards

What is a Management Information System (MIS)?

Provides routine reports for managerial decision-making.

9
New cards

What is a Knowledge Management System (KMS)?

Captures and shares knowledge within an organization.

10
New cards

What are Transaction Support Systems used for?

Recording and tracking daily business operations.

11
New cards

What are the main benefits of IS to managers?

Better decision-making, coordination, and planning.

12
New cards

What are cross-functional processes?

Processes that span multiple departments (e.g., order fulfillment).

13
New cards

What are the three components of a business process?

Inputs, resources, and outputs.

14
New cards

What is the Digital Economy?

An economy where digital technologies (internet, mobile, cloud) drive production, trade, and consumption.

15
New cards

What is the difference between functional area IS and enterprise IS?

Functional area IS supports specific departments; enterprise IS supports the entire organization.

16
New cards

What is the role of IS in a global organization?

Enable global communication, coordination, and data sharing.

17
New cards

What are the three major business pressures?

Market pressures, technology pressures, and societal/political/legal pressures.

18
New cards

What is a Customer Relationship Management (CRM) system?

Manages customer data and relationships to improve satisfaction and loyalty.

19
New cards

what are two examples of physical controls?

backup generators, and guards and locks

20
New cards

what are 2 examples of access controls

biometrics, and automatic log off feature

21
New cards

what are 2 examples of deliberate attacks

alien software and identity theft

22
New cards

what are 2 examples of administrative controls

background checks, and training 

23
New cards

what are 2 examples of application controls

safeguards built into programs, and output restriction

24
New cards

what are two examples of communication controls

encryption of data in transit(https), and anti malware software

25
New cards

what is master data 

core, semi-permanent data that describes key entities repeatedly used across transactions. 

example : hotel location, employee ID

26
New cards

what is transaction data ?

records specific business events or activities that change frequently

example: payment confirmation, guest check in

27
New cards

what are the 3 Vs of big data?

volume, velocity, variety

28
New cards

what is cloud computing ? 

using remote servers via the internet to store, manage and process data (instead of local servers) 

29
New cards

what are 3 characteristics of cloud computing

1) on demand self service

2) broad network access

3) utility pricing

30
New cards

what is OLTP

day to day transactions

31
New cards

what is OLAP

analytical transactions 

32
New cards

what is virtualization?

running multiple OSs on one machine

33
New cards

what is cloud infrastructure

remote servers providing storage and processing power

34
New cards

what are the 3 types of software

system, application, and firmware

35
New cards

what is primary storage

temporary storage used by CPU for active tasks

36
New cards

what is secondary storage

permanent, long term data storage

example is ssds or hard drives

37
New cards

what is open source

freely available code

38
New cards

what are output devices

speakers, printers, monitors

39
New cards

what are input devices

keyboard, mouse and barcode

40
New cards

what are processing devices

CPU, and it executes instructions

41
New cards

what is a DBMS

data base management system; software for creating, storing and managing data

42
New cards

what are primary activites in porters value chain

inbound logistics, outbound logistics, marketing and sales and services such as support/warranties

43
New cards

what are support activities in porters value chain 

tech development, procurement, firm infrastructure, HR

44
New cards

What does bandwidth measure?

The data-transmission capacity of a network (bps, Mbps, Gbps).

45
New cards

What are protocols?

Rules governing communication between devices

46
New cards

what is LAN

Local Area Network covering a small area such as a store or office.

47
New cards

Define WAN

Wide Area Network connecting multiple sites or cities.

48
New cards

What is a MAN?

Metropolitan Area Network—links offices within a city.

49
New cards

What is a PAN?

Personal Area Network—Bluetooth between phone and laptop.

50
New cards

Difference between Internet, Intranet, and Extranet?

Internet = public; Intranet = internal; Extranet = shared access with partners.

51
New cards

Compare wired vs wireless networks.

Wired = secure & stable (Ethernet); Wireless = mobile but less secure (Wi-Fi, 5G).

52
New cards

What does a firewall do?

Filters and blocks unauthorized traffic entering or leaving the network

53
New cards

What is a VPN?

Virtual Private Network that encrypts communication for remote access.

54
New cards

What is encryption?

Scrambling data so only authorized users can read it.

55
New cards

memory hierarchy

registers, cache, ram, secondary storage

56
New cards

what are the data base keys

primary, foreign, and secondary key

57
New cards

what is a primary key

uniquely identifies a record

example: student ID

58
New cards

what is a foreign key

connects records between tables

59
New cards

what is a secondary key

used for searching/sorting 

60
New cards

what is the role of input devices

to accept data and convert it to machine readable form

61
New cards

what is the role of output devices

to present data in human readable form

62
New cards

what is the role of CPU

interprets and executes instructions

63
New cards

what is the role of storage devices

store data and programs

64
New cards

what are porters competitive strategies

cost leadership, differentiation, customer orientation, innovation, operational effectiveness

65
New cards

what is a logic bomb

Hidden code that activates destructive actions under specific conditions

66
New cards

what is a virus

Malicious code that attaches to another program to spread

67
New cards

what is a worm

Malicious code that replicates and spreads on its own

68
New cards

what is a super computer

the fastest computer at any given time

69
New cards

what is a wearable

A miniature computer worn by a person allowing the users to multitask.

70
New cards

what is a fat client

A computer that offers full functionality without having to connect to a

network.

71
New cards

what is a thin client

A computer that does not offer the

full functionality of a fat client.

72
New cards

what is a propriety software

is purchased software that has restrictions on its use, copying,

and modification.

73
New cards

what is a software

A set of computer programs that

enable the hardware to process data.

74
New cards

what is documentation

Written description of the

functions of a software program.

75
New cards

what are computer programs

The sequences of instructions for the computer, which comprise software.

76
New cards

what are hybrid clouds

are composed of public and private clouds that remain unique entities, but are nevertheless tightly integrated.

77
New cards

server farms

Massive data centres, which may contain hundreds of thousands ofnetworked computer servers

78
New cards

what is extensible markup language (XML)

A computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data.

79
New cards

on premise computing

A model of IT management in which companies own their IT infrastructure (their software, hardware, networks, and data management) and maintain it in their data centres.

80
New cards

private clouds

IT infrastructures that are accessible only by a single entity or by an exclusive group

81
New cards

who are knowledge workers

Professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are experts in a particular subject area and who create information and knowledge, which they integrate into the business.

82
New cards

what is a database

A collection of related files or

tables containing data.

83
New cards

what are expert systems

An attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

84
New cards

what is a network

A connecting system (wireline or wireless) that enables multiple computers to share resources.

85
New cards

interorganizational information systems

(IOSs)

Information systems that connect two

or more organizations.

86
New cards

what is a software

A program or collection of programs

that enable the hardware to process data.

87
New cards

what are data items

An elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

88
New cards

what is digital transformation

The business strategy that leverages IT to dramatically improve employee, customer, and business partner relationships; support continuous improvement in business operations and business processes; and develop new business models and businesses.

89
New cards

what is digital divide

The gap between those

who have access to information and

communications technology and those who

do not.

90
New cards

what is a value system

A stream of activities that includes the producers, suppliers, distributors, and buyers, all of whom have their own value chains.

91
New cards

make to order

The strategy of producing

customized products and services

92
New cards

what is a value chain

sequence of activities through which the organization’s inputs, whatever they are, are transformed into more valuable outputs, whatever they are.

93
New cards

mass customization

A production process in which items are produced in large quantities but are customized to fit the desires of each customer.

94
New cards

electronic surveillance 

Tracking people’s activities with the aid of computers.

95
New cards

what is denial of service attack

An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typicallycrashes

96
New cards

trojan horse

Software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

97
New cards

what are cookies 

are small amounts of information that websites store on your computer, temporarily or more or less permanently.

98
New cards

what is TLS (transport layer security)

is an encryption standard used for secure transactions such as credit card purchases and online banking. TLS encrypts and decrypts data between a Web server and a browser end to end.

99
New cards

what is business continuity recovery

is the chain of events linking planning to protection and to recovery.

100
New cards

what is an information systems audit 

is an examination of information systems, their inputs, outputs, and processing.

It can also include an assessment of the efficiency and effectiveness of the system.