MIS180 Final - Meader SDSU

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/295

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

296 Terms

1
New cards

internet of things

a world where interconnected, internet-enabled devices/"things" can collect and share data without human interaction (machine to machine)

2
New cards

data

raw facts that describe characteristics of an event or object. ex: order date, amounts sold, phone numbers of customers

3
New cards

knowledge

skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources. (knowing what to do with data/info)

4
New cards

functional business areas

- sales

- marketing

- accounting

- finance

- operations

- human resources

5
New cards

sales

deals with customer data, sales report, commission data

6
New cards

marketing

deals with promotional data, sales data, advertising data

7
New cards

accounting

deals with transactional data, purchasing data, payroll data, taxation data

8
New cards

finance

deals with investment data, monetary data, reporting data

9
New cards

operations

deals with manufacturing data, distribution data, production data

10
New cards

human resources

deals with employee data, promotion data, vacation data

11
New cards

parts of a business information system

- people

- hardware

- software

- data

- networks

12
New cards

stakeholders

a person or group that has an interest or concern in an organization

13
New cards

interests of stakeholders

partners/suppliers - contracts/production

shareholders/investors - maximize profits, grow market share

community - associations, ethical recycling, increase employment

employees - fair compensation, job security, ethical treatment

customers - exceptional customer service, high quality products, ethical dealing

government - coherence to laws/regulations, increase employment, ethical taxation reporting

14
New cards

system

an organized purposeful structure that consists of interrelated, and interdependent elements

all _____ have a purpose or a goal

all _____ at their core, have processes

15
New cards

7 parts of a system

1) inputs

2) processes (that transform inputs)

3) outputs

4) controls

5) feedback

6) purpose/function that guides controls

7) time

16
New cards

5 parts of a process

1) inputs

2) processes

3) outputs

4) feedback

5) control

17
New cards

process

- looks for a particular end goal

- performance can be measured

18
New cards

system

- does not always produce a particular end

- performance can't always be measured

19
New cards

what computers are good at

- high speed, high volume, numerical computation

- fast, accurate, inexpensive communication within and between organizations

- storing huge amount of information in an easy to access, yet small space

- quick and inexpensive access to vast amounts of information, worldwide

20
New cards

what computers are bad at

- asking novel questions

- thinking creatively

- seeing patterns across non-digital data

- handling poorly structured, and open ended tasks

- non-verbal communication

- relationship building and maintenance

21
New cards

6 step rational decision making process

1) problem identification

2) data collection

3) solution generation

4) solution test

5) solution selection

6) solution implementation

22
New cards

problem identification

define the problems as clearly and precisely as possible

23
New cards

data collection

gather problem related data, including who, what, where, when, why and how. be sure to gather facts, not rumors or opinions about the problems

24
New cards

solution generation

detail every solution possible, including ideas that seem farfetched

25
New cards

solution test

evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?)

26
New cards

solution selection

select the solution that best solves the problem and meets the needs of the business

27
New cards

solution implementation

if the solution solves the problem, then the decisions made were correct, if not, the process should be repeated again

28
New cards

metrics

measurements that evaluate results to determine whether a project is meeting it's goals

29
New cards

critical success factors (CSF)

crucial step companies perform to achieve their goals and objectives, and implement their strategies

- create high quality products

- retain competitive advantages

- reduce product cost

- increase customer satisfaction

- hire and retain the best business professionals

30
New cards

key performance indicators (KPI)

quantifiable metrics a company uses to evaluate progress towards CSF's

- turnover rates of employees

- % of help desk calls answered within a minute

- number of product returns

- average customer spending

31
New cards

what-if analysis

checks the impact of a change in a variable on the model

- different variables are changed around until users understand the effects of various situations

32
New cards

sensitivity analysis

( a special case of what-if analysis) the study of the impact on other variables when one variable is changed repeatedly

33
New cards

goal-seeking analysis

finds the inputs necessary to achieve a goal such as a desired level of output (reverse of what-if and sensitivity analysis) repeatedly changing other variables until a certain value (goal) is achieved

34
New cards

optimization analysis

(extension of goal seeking analysis) find the optimum value for a target variable by changing other variables, subject specified constraints.

35
New cards

artificial intelligence

simulates human thinking and behavior, such as the ability to reason and learn. it's ultimate goal is to build a system that can mimic human intelligence

- increases speed and consistency of decision making

- solves problems with incomplete information

36
New cards

expert system

computerized advisory programs that imitate the reasoning precesses of of experts in solving difficult problems. Typically, they include a knowledge

37
New cards

intelligent agent

a special-purpose, knowledge based information system that accomplishes specific tasks on behalf of its users

38
New cards

problem

a situation that may be difficult, but may be solved, given the correct remedy

39
New cards

opportunity

a situation that may be used as an advantage

40
New cards

dilemma

a situation, though frustrating, cannot be avoided.

2 or more conflicting forces/priorities

41
New cards

structured decisions

have well designed methodology, are done regularly, and enough data available

ex: solving a math problem for which there is one correct answer

42
New cards

unstructured decisions

have unclear methodology, done rarely (or maybe for the first time), not enough data available

ex: estimating the future when variables are unknown, what should be in my novel?

43
New cards

decision making model

the process for concluding which decisions need to be made and how to find alternatives for those decisions

44
New cards

return on investment (ROI)

the earning power of a project

ROI = profitability/costs

is a KPI

45
New cards

benchmark

baseline values the system seeks to attain (optimal system results)

46
New cards

customer-facing

results in a product or a service that is received by an organization's external customer

47
New cards

business-facing

invisible to the external customer, but essential to the effective management of the business

48
New cards

bad processes

- takes too long

- wastes resources

- costs too much

- loses opportunities

- produces low quality

- leads to demoralized staff

49
New cards

causes of bad processes

- too many steps in the process

- decision makers don't have the info they need

- staff are lazy, don't know who to work with, or are protective of information, or of their perceived power

- old, obsolete information technology

- business functions are siloed

50
New cards

intellectual property

intangible property that is the result of creativity (such as patents or trademarks or copyrights)

51
New cards

copyright law

law that entitles the owner of a work to make and distribute reproductions of it

52
New cards

Hacker

Experts in technology who use their knowledge to break into computers/networks for profit or are motivated by the challenge

53
New cards

Virus writers

Write software with evil intent to annoy or cause real damage

54
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies

55
New cards

ethically challenged uses of IT

- individuals copy, use, and distribute software

- employees search organizational databases for sensitive corporate and personal info

- organizations collect, buy, and use info without checking the validity or accuracy

- individuals create and spread viruses that cause trouble for those using and maintaining IT systems

- individuals hack into computer systems to steal proprietary info

- employees destroy or steal proprietary organization info such as schematics, sketches, customer lists, and reports

56
New cards

Acceptable Use Policy

Expectations of conduct users must acknowledge to use an online service.

- not using the service as violating any law

- not attempting to break the security of any computer network or user

- not posting commercial messages to groups without prior permission

- not performing any non repudiation

57
New cards

Adware

Undesired software intended to advertise product to the user.

58
New cards

Spyware

Collects data about the user and transmits it over the internet without permission or knowledge

59
New cards

Ransomware

form of malicious software that infects your computer and asks for money

60
New cards

Hoaxes

Attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack onto their coworkers and friends, infecting many users along the way

61
New cards

Spoofing

The forging of a return address on an email so that the message appears to come from someone other than the actual sender. This is not a virus, but rather a way by which virus authors conceal their identity as they send out viruses

62
New cards

Phishing

Sending an email falsely claiming to be an established legitimate business in attempt to gain personal information for the purpose of identity theft

63
New cards

Pharming

Reroutes requests for legitimate websites to false websites that collect your information

64
New cards

Values

the ideas, beliefs, and attitudes about what is important that help guide the way you live

65
New cards

Morals

Codes of conduct governing behavior based on values

66
New cards

Ethics

The study of principles about what is right and wrong, fair and unfair.

67
New cards

Laws

society's values and standards that are enforceable in the courts

- values create laws

68
New cards

5 guiding principles of information ethics

Personal benefit

Social benefit

Principle of benevolence

Principle of paternalism

Principle of harm

69
New cards

personal benefit

Consider the extent to which an actual produces beneficial consequences for another person

70
New cards

social benefit

consider the extent to which an action produces beneficial consequences for society

71
New cards

Principle of benevolence

Help those in need

72
New cards

Principle of paternalism

Assist others in pursuing their best interests when they cannot do so themselves

73
New cards

Principle of harm

Do not harm others

74
New cards

Copyright protects:

Patents, trademarks, trade secrets (literary works, musical works, dramatic works, motion pictures)

75
New cards

"Fair Use" exceptions

1. If use is for non commercial purposes

2. If work is factual, rather than creative

3. If you use only a tiny, insubstantial amount of the material

4. If your use does not affect the potential market for or value of the protected work

76
New cards

IF function

=IF(logical_test, ["value_if_true"], ["value_if_false"])

77
New cards

NPER

calculates number of payments that will be made to pay off a loan, given the interest rate, payment amount, and original loan amount

78
New cards

RATE

calculates the interest rate earned for an investment given the number of payments made as a part of the investment, the payment amount, and the current value of the investment

79
New cards

PV

calculates the current value of an investment

80
New cards

FV

calculates the future value of an investment

81
New cards

Principle of autonomy

82
New cards

CPU/Processor

the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together

83
New cards

Primary Storage

the computer's main memory, consists of RAM, cache memory, and ROM, that is directly accessible to the central processing unit (CPU)

84
New cards

Secondary Storage

equipment designed to store large volumes of data for long term storage (diskette, CD, DVD, memory stick)

85
New cards

RAM (random access memory)

the physical hardware within a computer that temporarily stores data. Stores data that you are actively using, volatile.

86
New cards

ROM (read-only memory)

can only be read. cannot be modified/ is extremely difficult to modify. Retains it's contents when the computer is turned off (non-volatile)

87
New cards

Clockspeed

the operating speed of a computer, defined as the rate at which it performs and expressed in cycles per second

88
New cards

Ghz (gigahertz)

unit of measurement of speed of CPU, clock speed, frequency of electricity

89
New cards

Bit (b)

smallest unit of information that can be stored or manipulated on a computer, consists of zeros and ones. (binary code)

90
New cards

Byte

much larger than a bit, there are 8 bits in every byte. Represents one character or digit.

91
New cards

KB (kilobyte)

one thousand bytes

92
New cards

MB (megabyte)

one million bytes

93
New cards

GB (gigabyte)

one billion bytes

94
New cards

TB (terabyte)

one trillion bytes

95
New cards

PB (petabyte)

one quadrillion bytes

96
New cards

Operating Sytem (OS)

software that allows the computer to work. works between hardware and applications.

97
New cards

Applications

works within an OS to perform a specific user task, sometimes called programs, services, or algorithms

98
New cards

Programming Languages

- Java

- Python

- C++

- C#

- Virtual Basic

99
New cards

Source Code

contains instructions written by a programmer specifying the actions to be performed by a computer software. Written in a high level human-readable language

100
New cards

Object Code

contains the same computer program as source code, but in a computer-readable language, not readable by humans. (ex: 01001010100011101..)