1/61
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The definition of MIS is
Creating, monitoring, and adapting processes, information systems, and information to help organizations achieve their strategies
Technology decisions should be driven by
The business need
IS, IT, MIS are often used interchangeably in the business?
True or False
True
A process is
A way of doing something
The 4 non routine cognitive skills that are important for employees are
Abstract reasoning, systems thinking, collaboration, experiment
MIS exists to help people who work in a business achieve:
The strategies of that business
Moore's Law,
Indicates that computing power doubles every 18 months
The key business benefit of Moore's law is
Cost of data processing, communication, and storage is essentially 0
BPMN is
a form of documentation that shows the flow of system.
the acronym for Business Power, Motivation, and Networking
The 4 symbols used in a business process model notation are
circle, rectangle, diamond, cylinder.
What are the 5 components of the 5 component framework discussed in the book and in class?
Hardware, software, data, procedures, and people.
Information is
knowledge derived from data.
A procedure is:
a set of instructions for a person to follow when operating an information system.
The 5 characteristics of data are?
Accurate, timely, relevant, just sufficient, worth its cost.
Structured processes are
formally defined, standardized processes.
A business process is
a sequence of activities for accomplishing a function
The easiest component in the 5 component framework to change is:
Hardware
Data is
recorded facts or figures.
Which of the following connection types is most likely to be used in a Personal Area Network?
Bluetooth
Why does MIS exist in organizations?
To help businesses achieve the strategies of the organization
WAN stands for
Wide Area Network
Protocols are
a set of rules that 2 communicating devices follow
Domain Name services (DNS) is?
the translation of ip addresses to commonly remember able name
LAN stands for?
Local Area Network
In IS the cloud is
All answers are potentially correct.
Which of the following is an advantage of a Private Cloud set up over a Public Cloud set up?
Compliance with Laws and Regulations
Net neutrality is
the idea that all network traffic is created equal
What is the general purpose of an IP Address?
To uniquely identify a device location on a network.
Which of the following answer(s) is a service potentially offered in the cloud?
Platform as a service (malware as a service)
What is a foreign key?
A value in one table that appears as a primary key in another table to which it relates.
In a database, a query is?
The coding used to generate the report.
In a database, what is a form?
A view that is used to read, insert, modify, and delete data.
What is DBMS?
a program used to create and administer a database.
A relational database is?
A database that carry their data in the form of tables and represent relationships using primary and foreign keys.
What is a database?
Self-describing collect of integrated records.
In a database, a report is?
A view showing the requested data in a structured context.
Metadata is...
Data to help describe data in a database.
What is a DBA?
an IT professional whose job it is to administer a database.
What term/phrase describes the process of fixing a poorly structured table.
Normalization
What is a primary key?
A column or group of columns that identifies a unique row in a table.
Encryption is
the process of transforming clear text into coded, unintelligible text for secure storage or communication.
When discussing IS security, authentication
Verifies the credentials of an individual seeking to access a resource.
A firewall is?
a computing device that prevents unauthorized access to parts of a network.
Which of the following is not a computer crime?
Block chain cryptography
What is the primary purpose of information systems security?
Preventing unauthorized access to an information system.
When discussing IS security, a target is?
the asset that is desired by the threat.
Which of the 5 components of an information system is the hardest to secure from threats?
People
When discussing system security, a safeguard is?
A measure that individuals or organizations take to block the threat from obtaining an asset.
When discussing system security, a patch is?
A software modification, generally by the software manufacturer to mitigate risk.
All of the following are personal security safeguards except?
Install firewalls at the border of devices and networks.
A long term plan of a particular company in order to gain a competitive advantage over its competitors in an industry is known as the companies {blank}
Competitive strategy
An information systems is
A collection of components, including but not limited to computer, that stores and retrieves data and produces information
Porter's 5 forces are:
Substitutes, New entrants, existing rivals, bargaining power of suppliers, bargaining power of customers.
Value chain is
A network of value creating activates
A long term plan of a particular company in order to gain a competitive advantage over its competitors in an industry is known as the companies {blank}
Competitive strategy
A business activity is
a task within a business process
Dynamic processes are
more adaptive, intuitive, and can be used to help make decisions.
Software as a service is
A cloud based offering that offers the hardware, infrastructure, and software.
In platform as a service, the hosing company provides what?
Everything except the applications and data.