ISYS 2 Exam 1

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/153

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

154 Terms

1
New cards

Information System

Set of interrelated component that work together to create, collect, process, store, and disseminate (Spread) information

2
New cards

What are information systems used for? Part 1

Accomplishing work-related tasks and every day living activities

3
New cards

What are information systems used for? Part 2

To gain a competitive advantage

4
New cards

What are the parts of competitive advantage?

cost, differentiation, and focus

5
New cards

What is Cost

Provide same value at lower price

6
New cards

What is Differentiation

Provide superior products or services for a target market better than anyone else

7
New cards

What are the 4 components of Leavitt's Diamond?

People, Technology Infrastructure, Structure, and Processes

8
New cards

People

motivation, training, support

9
New cards

Focus

Provide products or services for a target market better than anyone else

10
New cards

Technology Infrastructure

Hardware, Software, Databases, Networks, Facilities, Services

11
New cards

Structure

Roles, responsibilities, and authority

12
New cards

Processes

Procedures, standards, measures, and tools

13
New cards

What is Levitt's System Model?

A framework used to understand the connection between key components of an organization: People, Process, Technology Infrastructure, and Structure

14
New cards

People's Role in Business

Identify the need, define requirements, and use the system

15
New cards

People's Role in IT

Manage, develop, run, and maintain the systems

16
New cards

Shadow IT

Any type of IT purchased or developed outside of the IT organization

17
New cards

Pros of Shadow IT

Efficient, flexible, cheaper, and innovative

18
New cards

Cons of Shadow IT

Not necessarily secure, can duplicate work, costs more

19
New cards

Transaction Processing Systems

Collect, process, and store transactions/events that occur in the day-to-day operations of a company; can handle very large volumes of transactions simultaneously

20
New cards

Examples of TPS's

Hotel reservation, student registration, and payroll systems

21
New cards

Decision Support Systems

Provide analysis tools and access to databases to support decision-making process; compile information from several sources

22
New cards

Examples of DSS's

Financial planning, loan and investment analysis

23
New cards

Management Information Systems

Provide detailed information to help managers ensure the organization runs efficiently

24
New cards

Inventory management (MIS)

Order the right quantity at the right time

25
New cards

Process controls (MIS)


Monitor and adjust a process

26
New cards

Sales and marketing (MIS)

Compare YoY sales by store

27
New cards

Intelligent Systems

Advanced computer systems that can gather, analyze, and respond to data it collects from its environment

28
New cards

Artificial Intelligence (AI)

Emulate or enhance human capabilities

29
New cards

Examples of IS's

Factory automation, Roomba Vacuum, autonomous vehicles

30
New cards

Business Intelligence Systems

Analyze Big Data to better understand various aspects of a business

31
New cards

Big Data

Extremely large data sets; analyzed computationally to reveal patterns, trends, and associations

32
New cards

What is a charactersitc of Big Data?

Analyzed using software specifically designed to handle large, complex data sets

33
New cards

Customer Relationship Management

Manages business relationships and interactions with existing and potential clients

34
New cards

What is a charactersitc of Customer Relationship Management?

Helps businesses learn about customers and corresponding trends

35
New cards

Electronic Commerce Systems

Enable customers to buy goods and services from a company's website

36
New cards

Enterprise Resource Planning (ERP)

Consists of integrated modules that each focus on one business area of the organization: sales management, human resources, asset management, project management, accounting and finance

37
New cards

Efficent

To produce an intended result in a way that results in the least amount of waste: time, effort, and/or resources

38
New cards

Effective

To produce a better result, one that delivers more value or achieves a better outcome

39
New cards

T/F: Efficient processes are always effective.

False

40
New cards

Cybercrime

Using a computer to commit an illegal act

41
New cards

Is this cybercrime? Targeting a computer while committing an offense

True

42
New cards

Is this cybercrime? Using a computer to commit an offense

True

43
New cards

Is this cybercrime? Using computers to support criminal activity

True

44
New cards

Computer Viruses

A destructive program that disrupts the normal functioning of information systems and spreads to other computers through infected e-mails and files

45
New cards

Worm

A variation of a virus that is targeted at networks; spread by itself and replicates endlessly across the Internet

46
New cards

Spyware

Software that monitors the activity on a computer (capture credit card numbers)

47
New cards

Spam

Bulk, unsolicited e-mail sent to millions of users at extremely low cost to distribute malware or conduct a phishing attack

48
New cards

Cookies

Small file placed on a user's computer; can be legitimate (shopping cart) but can be abused (track individuals' browsing habits) and can contain sensitive information (like credit card numbers) and pose a security risk

49
New cards

Software Piracy

The practice of using software that isn't properly licensed and paid for, such as purchasing one copy of a product and then using it on multiple computers

50
New cards

Cybersquatting

The practice of buying and holding a domain name with the intent to sell it later for a large profit; usually involves existing businesses

51
New cards

Types of Cyberattacks

Ransomware, denial of service, data breach, cyberespionage, cyberterrorism, cyberwar

52
New cards

Ransomware

type of malware that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off

53
New cards

Denial-of-Service Attacks

Seeks to overload servers by sending too many requests or messages for the server to handle

54
New cards

Payroll systems require only transactioning

True

55
New cards

Data Breach

Unauthorized individuals release or access sensitive data

56
New cards

Backups

Critical for business continuity in the event a disaster strikes; medias include CD, external hard drives, and tapes

57
New cards

Cold Backup Site

An empty warehouse with all necessary connections for power and communication but nothing else

58
New cards

Hot Backup Site

Fully equipped backup facility, all needed equipment and one-to-one replication of current data

59
New cards

Physical Access Restrictions

Typically focus on authentication; something you have (keys, picture id's, smart badges), something you know (password, PIN number, security questions), something you are (retinal patterns, fingerprints)

60
New cards

Firewalls

The part of a computer system designed to detect intrusion and prevent unauthorized access to/from a private network

61
New cards

Encryption

The practice if safeguarding data by encrypting it so it can only be accessed by a decryption process that requires a cypher and a suitable password, key, or certificate

62
New cards

Virtual Private Network (VPN)

Allows remote site/users to connect to the Organization's network using a secure tunnel

63
New cards

Artificial Intelligence (AI) goals

Tackle the challenges of patterns, apply context, or draw conclusions

64
New cards

What is AI?

A branch of science concerned with designing intelligent computer systems

65
New cards

Expert Systems

Precursor to today's modern AI systems; emulate the decision-making ability of a human expert

66
New cards

What is one charactersitc of an Expert System 

Rule based system; limited in capability

67
New cards

What is another charactersitc of an Expert System 

Take knowledge from human expert and convert into hardcoded rules (conditional statements) that can be applied to input data

68
New cards

User Interface

Allows for input and output of the data; input can be typed command, scanned document, verbal instruction while output can be verbal, written or an image

69
New cards

Knowledge Base

Represents facts and rules

70
New cards

Fact

Know or proven to be true

71
New cards

Rule

Conditional statement that links conditions to outcomes

72
New cards

Inference Engine

Applies the rules to known facts to deduce new facts

73
New cards

Characteristics of Expert Systems

Knowledge acquisition may be difficult , adheres only to specific domains, requires manual updates, can not learn by itself, incapable of providing logic beyond the decisions

74
New cards

Machine Learning

Ability of a computer to learn without specifically being programmed; a program uses input to train a model

75
New cards

Generative Models

Learn about the patterns in the training data; generate something new

76
New cards

Discriminative Models

Learn from the relationship between labels and data points; can classify those data points

77
New cards

Examples of Discriminative AI

Number, classification, porbability

78
New cards

Examples of GenAI

Natural language, image, audio

79
New cards

Application Software

Applies the power of a computer system to enable people, workgroups, and enterprises to solve problems and perform specific tasks

80
New cards

Databases

Collections of related data organized in a way that facilitates data searches

81
New cards

Infrstructure

Set of information systems components, typically physical components, that enable an IT service

82
New cards

Proprietary/Custom Software

Developed to meet specific needs of the Organization; intellectual property stays in house, more easily modified, supports unique business processes, provides a competitive advantage

83
New cards

Off-the-Shelf (packaged) Software

Should be used to support common business practices; opportunity to migrate to industry best practices/more generic

84
New cards

Application Software: External Acquisition

Packaged software must be licensed for use

85
New cards

Which one of the following inresaes the likelyhood of success for ERP’s?

Sufficient Time, Training, Know project progress and risks

86
New cards

Open-Source Software

Program's source code is available for use or modification, typically at no charge; created, maintained, and updated by volunteers all over the world

87
New cards

Software as a Service (SaaS)

Third-party provider hosts applications and makes them available to subscribers via the internet

88
New cards

Information System Infrastucture

Set of IS components, typically physical components, that enable an IT service

89
New cards

IS Infrastructure Components - Hardware

Computers that run the applications and databases necessary for processing transactions or analyzing business data

90
New cards

Hardware: Basic Components

Central Processing Unit (CPU), Memory, Bus, Input/Output Devices

91
New cards

Central Processing Unit (CPU)

Core of the computer; receives instructions and performs calculations or actions based on those instructions

92
New cards

What is storage measured in?

Bytes

93
New cards

Random Access Memory

Memory where instructions or data can be temporarily stored; volatile storage (loose contents if the current is disrupted)

94
New cards

Cache Memory

High-speed memory; frequently used data stored here

95
New cards

Read-Only Memory (ROM)

nonvolatile - contents are not lost if power is interrupted; provides permanent storage for data and instructions that do not change (programs and data from the Computer Manufacturer)

96
New cards

IS Infrastructure Components - System Software

The collection of programs that control the basic operations of computer hardware

97
New cards

IS Infrastructure Components - Storage

Efficiently storing and retrieving data is key to Organizational Success

98
New cards

Secondary Storage

Used to store large amounts of data, instructions, and information; more permanent and less expensive than main memory, not directly accessible by the CPU

99
New cards

IS Infrastructure Components - Networking

Interconnects devices that can exchange data and share resources with each other

100
New cards

IS Infrastructure Components - Data Centers

Building or a dedicated space within a building used to house computer systems and associated components; centralization facilitates functions such as management, repairs, upgrades, and security

Explore top flashcards

French Revolution
Updated 995d ago
flashcards Flashcards (128)
Vocab Ch.1
Updated 737d ago
flashcards Flashcards (33)
Waves Vocab
Updated 195d ago
flashcards Flashcards (26)
Spanish Taino
Updated 183d ago
flashcards Flashcards (26)
Terms for Plays
Updated 902d ago
flashcards Flashcards (24)
Classical Liberalism
Updated 736d ago
flashcards Flashcards (73)
French Revolution
Updated 995d ago
flashcards Flashcards (128)
Vocab Ch.1
Updated 737d ago
flashcards Flashcards (33)
Waves Vocab
Updated 195d ago
flashcards Flashcards (26)
Spanish Taino
Updated 183d ago
flashcards Flashcards (26)
Terms for Plays
Updated 902d ago
flashcards Flashcards (24)
Classical Liberalism
Updated 736d ago
flashcards Flashcards (73)