1/70
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Data
collection of numbers, characters, names, etc
Ex: Name, Address, GPA
Knowledge
information or data that has been organized and processed to convey understanding
Information
knowledge derived from data
Ex: students name and GPA
Primary Storage
(Main Memory)
stores information for brief periods of time on chips located on the mother board
Types: Register, Cache, RAM and ROM
Secondary Storage
stores large amounts of data for long periods of time
Ex: Magnetic tape, Disks, Flash drive
Main Memory
Main Memory = RAM
primary storage, holds software programs and small amounts of data
RAM
RAM = Main Memory
primary storage, holds software programs and small amounts of data
(Closer to the CPU than secondary storage and faster)
Cache Memory
high speed memory that enables the computer to temporarily store frequently used instructions, more cache mem = faster computer
(closer to CPU than RAM so its faster)
Read-only Memory (ROM)
where critical instructions are stored, nonvolatile
Ex: instructions for computer boot up
Volatile
needs electricity
Ex: RAM, cache, registers
Non-volatile
does NOT need electricity
Ex: ROM, Flash drive, Hard drive
Computer Processing Unit (CPU)
brain of the computer
(where the ALU sits)
Machine Cycle
4 step process performed by your computer for each instruction it receives
Fetch, Decode, Execute, Store
(Friends Don't Eat Seatus)
Output
Any info used to communicate results
Ex: Reports, Sound, Pictures, Image on a screen
Output device
Devices that communicate results
Ex: Printer, Computer monitor, Speakers
Input
Things entered into a computer
Ex: Text, Sound
Input Device
A device that feeds data into a computer
Ex: Mouse, Keyboard, Microphone
Information System
collects, processes, stores, analyzes, and disseminates information for a specific purpose
Information System Components
Hardware, Software, Network, Procedures
Enterprise System
software the entire company uses, connects all the networks in a company
Network
(Client server network most common)
connecting system that permits different computers to share resources
Ex: Wireline or Wireless
Customer Relationship Management (CRM)
organizational strategy to address customer requirements and discover things about the customers, then provide high quality service
(Suite of software applications that assist a business in managing the customer life cycle)
Market Basket Analysis
companies try to find what things people buy together and put them there in the store
RFM scores
classifies customers based on Recency, Frequency, Monetary
Supervised data
Have known categories you can put customers into
Unsupervised data
Do NOT have known categories you can put customers into
Customer Life Cycle
Marketing, Acquisition, Relationship management, Lost-churn
Systems Development Life Cycle (SDLC)
Development method organizations use for large projects
1. System Investigation
2. Systems Analysis
3. Systems Design
4. Programming and testing
5. Implementation
6. Operations and maintenance
RAD systems development
rapid application development
Waterfall systems development
development must happen in a set sequence
Agile systems development
do NOT have to follow a particular order when developing a system
Enterprise Resource Planning (ERP) system
designed to correct for a lack of communication between functional area systems
Functional Area Systems
system that supports a specific area of a business
Competitive Strategy
how firms plan to gain a competitive advantage
Ex:
1. Lowest cost across an industry (Walmart)
2. Lowest cost within an industry segment (Gas in particular market like Harrisonburg)
3. Better product or service across the industry (Apple)
4. Better product or service within an industry segment (High end cars)
Value Chain
sequence of activities through which an organizations inputs are turned into more valuable outputs
Primary Activities (Value Chain)
1. Inbound Logistics: getting inputs to the factory
2. Operations: day-to-day
3. Outbound Logistics: distribution
4. Marketing and Sales
5. Service
Secondary Activities (Value Chain)
1. Firm Infrastructure: overall plan and processes to get there
2. Human Resource Management: personnel recruitment, staff training
3. Technological Development
4. Procurement: suppliers, vendors, partner contracts
Porters 5 Forces
1. Threat of New Entrants
2. Threat of Substitute product/service
3. Bargaining Power of Suppliers
4. Bargaining Power of Customers
5. Rivalry within the Industry
Business Process Management (BPM)
focuses on improving corporate performance by managing and optimising a company's business processes
Storage Mediums
places where data can be stored
Optical Storage
uses a laser
Ex: CD, DVD
Magnetic Storage
uses a magnet
Ex: flashdrive, floppy disk, magnetic tape
Vertical Market Software
software used specifically in that market
Ex: Medical office software
Horizontal Market Software
software that can be used across an industry
Ex: Microsoft office
Operating System
manages computers and allows hardware to interact with the computer
Ex: Windows, Mac OS
Open Source Software
software developed by a group of people at no cost to the user
Ex: Linex
Application Software
program designed to support SPECIFIC TASKS
Ex: Spotify, Excel, any Microsoft Office, gaming software
Data Warehouse
collection of data, organized by subject to support decision makers in the organization
(process, organize, and store info)
Data Mart
scaled down version of a data warehouse
Dirty Data
database record that contains errors like duplicated records, incomplete/outdated records
Protocol
standard set for any electronic device so they can communicate
Viral Market
marketing that is done over the web
Ex: friends tell friends, customers tell customers
Social Networking
use of dedicated websites or applications to interact with other users
Social Computing
combine social behavior with computing
Cloud Computing
computing that provides on-demand, pay as you go access, just like Apple's iCloud
Ex:
1. SAAS: subscribing to a service developed by a 3rd party (Office 365)
2. PAAS: can manage code and data
3. IAAS: takes the most work managing
Ecommerce
commerce that happens with computers and other electronic devices
Ex:
1. B2B: manufacture to wholesalers
2. B2C: Retail
3. C2C: e-Bay
Human Capital
investing in employees knowledge so they can give back to the company
Ex: Employee training
Social Capital
number of connections a person has within and between social networks
Ex: Attending an event
Mashups
website that takes info from other websites and links them to create a better user experience
Ex: Real-estat website
Implementation (Deployment)
process of converting from an old system to a new one
Ex:
1. Piolet
2. Phased: one department at a time
3. Parallel: 2 systems running side by side
4. Plunge: going right into the new system and out with the old
Malware
malicious software intended to harm a computer
Security Threats
1. Malicious Code: part of code intended to breach security or damage software (Virus, Worms)
2. Hacking: using a computer to exploit weaknesses in a computer system to gain entrance into the system (Spoofing, pre-texting, password cracking)
3. Natural Disaster
4. Theft: taking property from a computer system
IT Jobs
1. Chief Information Officer (CIO): in charge of the IS function
2. Business Analyst: designs solutions for business problems; interfaces closely with users to demonstrate how IT can be used innovatively
Database
collection of related files or tables containing data
Entity Relationship Diagram (ERD)
maps out the tables and fields you need in your database
Table
collects info on a specific topic (person, place, or thing)
Field
column
Record
row
Primary Key
unique identifier in a table
Foreign Key
primary key from another table for the sole purpose of creating a relationship
Types of Relationships
1. One to one
2. One to many (most common)
3. Many to many