INFO123 Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

What are the Five Forces in the Porter's 5 Forces Model?

Buyer power, supplier power, threat of substitutes, threat of new entrants, rivalry among existing competitors

2
New cards

Porter's Generic Model

Broad market or focused strategy (narrow market) focusing on cost leadership or differentiation or certain focused strategy.

3
New cards

Value Chain Model

Firm infrastructure, human resource management, technology development, procurement. And then inbound logistics, operations, outbound logistics, marketing and sales and customer service.

4
New cards

The Triple Constraints

Scope (functional requirements), time (deadline) and costs (budget/expense)

5
New cards

The System's Development Life Cycle (SDLC)

Planning, anaylsis, design, development, testing, implementation, maintenance.

6
New cards

Who are involved in IS development?

System/Buisness analyst, users, managers, vendor/suppliers, programmers, technical specialists

7
New cards

Primary Project Planning (SMART)

Specific, Measureable, Attainable, Relevent, Time-Bound

8
New cards

System Development Project Manager Techniques

Draw up project plan, then balance the triple constraints, then manage the soft issues

9
New cards

What are the soft issues of project planning?

Managing people, communications and change.

10
New cards

System Development Methodologies

waterfall, agile, rapid application development, extreme programming, rational unified process, scrum

11
New cards

Explain Waterfall and what is it most ideal for?

A sequence of phases in which the output of each phase becomes the input for the next. its ideal for projects with clear, unchanging requirements and a need for a structured approach.

12
New cards

Explain Agile and what is it most ideal for?

It is iterative develoment, consisting of a series of tiny projects. It aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.

13
New cards

Explain Rapid Application Development (RAD) and what is it most ideal for?

emphasizes quick development and iteration of prototypes. It focuses on rapid delivery by using user feedback to refine and improve prototypes continuously.suited for rapid development and frequent iterations.

14
New cards

Explain Extreme Programming and what is it most ideal for?

Extreme Programming (XP) is an Agile methodology that focuses on improving software quality and responsiveness to changing customer requirements. It promotes frequent releases in short development cycles, which improves productivity and introduces checkpoints where new customer requirements can be adopted.suited for rapid development and frequent iterations.

15
New cards

Explain Rational Unified Process (RUP) and what is it most ideal for?

. It provides a disciplined approach to assigning tasks and responsibilities within a development organization and aims to ensure the production of high-quality software that meets the needs of its end-users. offers a structured approach with a focus on use cases and architecture.

16
New cards

Explain waterfall and what is it most ideal for?

A sequence of phases in which the output of each phase becomes the input for the next. is ideal for projects with clear, unchanging requirements and a need for a structured approach.

17
New cards

Explain Scrum and what is it most ideal for?

uses small teams to produce small pieces of deliverable software, using sprints to achieve an appointed goal. Each day begins or ends with a stand-up meeting to monitor and control the development effort.

18
New cards

Project Planning Diagrams

1) PERT chart (dependency or critical path)

2) Gantt chart

19
New cards

What is outsourcing? And why do people use them?

Is the process of hiring another organisation (external company) to perform a service. To save costs, gain expertise and free up management time.

20
New cards

What are the advantages of outsourcing?

1. cost reduction

2. faster project completion

3. high level of expertise

4. flexibility (management advantages)

5. risk reduction (reduce implementation risk)

21
New cards

What are the risks of outsourcing?

loss of control, benefits outweighed by long-term costs, no easy exit, highly dependent on vendors over time, security and intellectual risks.

22
New cards

IS/IT outsourcing alternatives

Iaas (offers basic infrastructure), Paas (offers a platform for developing applications), Saas (offers ready-to-use software applications).

23
New cards

Information MIS

(supports operations)

Backup

Recovery

disaster recovery

business continuity planning

24
New cards

Agile MIS

(Supports change)

Accessibility

Availability

Maintainability

Portability

Reliability

Scalability

Usability

25
New cards

Sustainable MIS

(Supports Sustainability)

- Grid computing

- Cloud COmputing

- Virtualization

26
New cards

Backup

An exact copy of a system's information

27
New cards

Recovery

The ability to get a system up and running in the event of a system crash or failure

28
New cards

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

29
New cards

Cold Site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

30
New cards

Warm site

A separate facility with computer equipment that requires installation and configuration

31
New cards

Business Continuity Plan

A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

32
New cards

IoT

The network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.

33
New cards

How does IoT work in regards to architecture?

- Sensing/Device (motion sensor, GPS, proximity)

- Connectivity (bluetooth, cellular)

- Data Processing (Algorithms, AI, Machine Learning)

- User Interface (UX, Touch Screen)

34
New cards

Cloud Computing

using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer

35
New cards

Cloud Computing Characteristics

On-Demand Self Service

Rapid Elasticity

Broad Network Access

Resource Pooling

Measured Service

36
New cards

Private cloud - And what is its advantages and disadvantages?

serves only one tenant/organization and can be on premise or service provided.

- lots of control, customisation and security

- however, it is costly and high maintenance

37
New cards

Public cloud - And what is its advantages and disadvantages?

Multi-tenant environment, provided by service provider and shared among multiple organisations.

Advantages:

- Cost-effective (lower costs as resources shared and pay-as-you-go basis)

- Maintenance free (provider does it for you)

Disadvantages:

- Data security is a concern

- limited customisation

- less control over infrastructure and data management.

38
New cards

Hybrid cloud - And what is its advantages and disadvantages?

Combines private and public clouds integrated through networking.

Advantages:

- cost effective

- use public cloud for non sensitive data

- use private cloud for sensitive data

Disadvantages:

- more complex to manage

- high cost.

39
New cards

PaaS

Platform as a Service.

Provides a platform that is quick and reliable developing and delpoying applications.

Targets IT professionals and developers.

Offers more control

40
New cards

Saas

Software as a Service

Delivers fully functional software to end users

Offers less control as the provider manages everything

Targets end users needing specific software functionalities

41
New cards

IaaS

Infrastructure as a Service.

useful for heavily utilized systems and networks.

Provides virtualised infrastructure resources

Offers the highest level of control over infrastructure

Targets IT administrators and developers

42
New cards

Opportunities of Cloud Computing

- Enables service to be used without any infrastructure understanding

- Works economies of a scale

- Stored remotely but accessible from "anywhere"

43
New cards

Challenges of Cloud Computing

- Use of cloud computing means dependence on others (can limit flexibility and innovation)

- Security risks

44
New cards

IoT Processes

1. Data gathering

2. Data transmission

3. Data processing and analysis

4. Decision Making

5. Notification and Alerting

6. Order Fulfillment

45
New cards

Disruptive technology

A new way of doing things that initally does not meet the needs of existing customers

46
New cards

Sustaining Technology

Produces an improved product customers are eager to buy

47
New cards

Web 1.0

A term to refer to the WWW during its first few years of operation between 1991 and 2003

48
New cards

eCommerce

the buying and selling of goods and services over the internet

49
New cards

What are the advantages of eBusiness

- Expanding global reach

- Opening new markets

- Reducing costs

- Improving effectiveness

50
New cards

Expanding global reach

- What is information richness?

Refers to the depth and breadth of details contained in a piece of online information

51
New cards

Expanding global reach

- What is information reach?

Measures the number of people a firm can communicate with all over the world

52
New cards

Opening new markets

- What is mass customisation?

The ability of an organisation to tailor its products or services to the customers specifications

53
New cards

Opening new markets

- What is personalisation?

Occurs when a company knows enough about a customer's likes and dislikes to fashion offers that likely appeal to that person,

54
New cards

Reducing Cost (the longtail is also one of them)

- disintermediation

When a business sells directly to the customer and cuts out the intermediary.

55
New cards

Reducing cost (the longtail is also one of them)

- intermediaries

Agents, softwares or businesses that provides a trading infrastructure (distributor/retailer)

56
New cards

Improving effectiveness (heat map is also one of them)

- Interactivity

Measures advertising effectiveness by counting visitor interaction with the target ad

57
New cards

Improving effectiveness (heat map is also one of them)

- Stickiness

Measures the amount of time visitors spend on a website or application

58
New cards

Analysing Website Data

- Viral marketing

a strategy where analysing website data helps identify and leverage content that is likely to be shared and spread by users, thereby increasing the reach and visibility of a product/service.

59
New cards

What are examples of eBusiness forms?

- content providers

- infomediaries

- online marketplaces

- portals

- service providors

- transaction brokers

60
New cards

eBusiness revenue models?

1. Advertising fees

2. License fees

3. Subscription fees

4. Transaction fees

5. Value-added service fees

61
New cards

revenue generating strategies

search enginge, search engine ranking, search engine optimization (seo)

62
New cards

Web 2.0 and what are its 3 qualities and its 4 key factors

The next generation of internet use - a more mature, distinctive communications platform characterised by 3 qualities.

qualities:

1. Collaboration

2. Sharing

3. Free

key factors:

- Content sharing through open sourcing

- User-contributed content

- Collaboration inside the organisation

- Collaboration outside the organisation

63
New cards

Content sharing through open sourcing - what is it and what are examples

Open system - Uses non-propriety hardware and software based on public standards, allowing 3rd parties to create compatible add-ons.

Source code

Open source

Closed source

64
New cards

User contributed content - what is it and what are examples

created and updated by many users for many users

- Native advertising

- Reputation system

65
New cards

Collaboration inside the organisation - what is it and what are examples

- Collaboration system: tools that support the work of teams or groups by facilitating the sharing and flow of information.

- Collective intelligence

- Knowledge management: Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.

66
New cards

What are examples of Business 2.0

- social media

- social network

- social networking

- social network analysis (SNA)

67
New cards

Social Tagging - What does Tags mean?

Specific keywords or phrases incorporated into website content for means of classification or taxonomy

68
New cards

Features of social tagging

- hashtag

- folksonomy

- social tagging

- social bookmarking

- website bookmark.

69
New cards

What is social computing

Social computing combines social behaviour and information systems to create value.

This is focused mainly on user-contributed content

(Users, rather than organisations, produce, control, use, and manage content via interactive communications and collaboration.)

70
New cards

Examples of social trust

- misinformation

- disinformation

- fake news

- filter bubble

71
New cards

Web 3.0

Based on "intelligent" web applications using natural language processing, intelligence applications and machine-based learning/reasoning

72
New cards

Examples of Social computing

- user-generated content

- social marketing (twitter, instagram, facebook)

- customer reviews and rating

- online communities and forms

- influencer marketing

73
New cards

Information ethics

legal but unethical

legal and ethical

illegal and unethical

illegal but ethical

74
New cards

List possible security risks

- phishing

- ransomware

- spyware

- social engineering

- man in the middle (eavesdropping)

- denial of service (disrupt service, make unavailable)

- malware (virus)

- unathorised access

- data breach (personal, financial and health info being exposed)

- data loss

75
New cards

List possible losses due to cyber attacks

- financial performance

- revenue loss

- damaged reputation

- other expenses

76
New cards

Why do buisnesses use information management policies?

The organisations strive to build a corporate culture based on ethical principles that employees can understand and implement

77
New cards

list Information management policies

- social media policy

- acceptable use policy

- information privacy policy

- ethical computer use policy

- email privacy policy

- workplace monitoring policy

78
New cards

What are the four primary secruity measures (protection approaches)

1. Predict

2. Prevent

3. Response

4. Detect

79
New cards

Methods of prediction?

Predict the most likely attacks, targets and methods

- Risk assessment

- Identify threats

- Produce reports

80
New cards

Methods of prevention

Prevent of deter attacks so no loss is experience

- People: Info security policy and plan, control access, regular security audits and montioring

- Technology: Smart cards, tokens, biometrics, content filtering, end-to-end encryption, firewall

81
New cards

Methods of response and detection

Response rapidly addresses incidents to minimise loss and return to normal

Detection identifies attacks not prevented to allow for rapid thorough response.

- Intrusion detection software

- Business continuinty plan/recovery plan/backup/disaster plan/disaster sites

82
New cards

Why do emerging technologies matter?

- innovation and advancement

- economic growth

- improved efficiency and productivity

- addressing global challenges

- competitive advantage

- transforming society

83
New cards

what are the advantages of ai

- effiency

- insights

- personalisation

84
New cards

what are the disadvantages of ai

- job displacement

- bias

- privacy

85
New cards

what is blockchain

blockchain is a secure, decentralised way to record transactions in a transparent and tamper-proof manner.

86
New cards

applications of blockchain

smart contracts, digital currency, securities, record keeping

- IoT

- accounting ledgers

- investment management

- crowd funding

- corporoate governance

87
New cards

advantages of blockchain

- it is a single file shared by a network of computer

- shared, "trusted" public ledger

- transparency: all can inspect and verify it

- no single user controls it

- anonymity and privacy

- security and tamper resistance

88
New cards

disadvantages of blockchain

- may be computationally expensive

- may be high energy use

- development costs, and high cost of failure

- risky: the high threat of regulation and legal scrutiny