1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data
Raw facts such as an employee number or total hours worked in a week.
Information
A collection of data organized and processed so that it has additional value beyond the value of the individual facts
Process
a set of logically related tasks performed to achieve a defined outcome
Knowledge
The awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision.
-Accurate
-Accessable
-Complete
-Economical
-Flexible
-Relevant
-Reliable
-Secure
-Simple
-Timely
-Variable
Characteristics of Quality Information
Information System
hardware, software, data, procuture, people
A set of interrelated components that collect, process, store, and disseminate data and information.
Value Chain
A series of activities that an org performs to transform inputs into outputs in such a way that the value of the input is increased
Supply Chain
A key value chain whose primary activities include inbound logistics, operations, outbound logistics, marketing and sales and service.
Supply Chain Management
The management of all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and the right cost.
Innovation
the application of new ideas to the products, processes, and activities of a firm leading to increased value
Soft Side of Implementing Change
The work designed to help employees embrace a new IS and way of working
Change management model
the description of phases an individual or org goes through in making a change
Three Stage Approach:
-unfreezing: preparing for change
-Moving: making the change
-Refreezing: institutionalizing
Lewin's Model of Change
Force Field Analysis
An approach to identify both the driving and restraining forces that influence whether change can occur.
Leavitt's Diamond
proposes that every org system is made up of four components:
1. people
2. tasks
3. structure
4. technology
any change in one leads to change in all
Technology Acceptance Model
specifies the factors that can lead to better attitudes about an information system, along with higher acceptance and usage of it.
Diffusion of innovation theory
explains how a new idea or project gains acceptance and diffuses through a specific population
1. Operation
2.Development
3. Support
3 Roles of IS careers
Careers
See word doc
Hardware components include devices that:
-input
-processing
-data storage
-output
Anatomy of a Computer (hardware)
Central Processing Unit
Part of the computer that seqeuences and executes instructions
input/output device
a computer component. that provides data and instructions to the computer and receives results from it
bus
a set of electronic circuits used to route data and instructions to and from the various components of a computer
co processor
part of the computer that speeds processing by executing specific types of instructions while the CPU works on another processing activity
multicore Processor
has two or more independent processing units which are capable of sequencing and executing insturctions
parallel computing
simultaneous execution of the same tasks on multiple processors to obtain results faster
grid computing
use of a collection of computers, often owned by multiply individuals or orgs, that work in a coordinated manner to solve a common problem
RAM- a form of memory in which instructions or data can be stored temporarily (can lose data if they lose power)
ROM- contents are not lost if the power is turned off or interupted
RAM vs ROM
Secondary Storage
stores large amounts of data, instructions, and information more permanently than allowed with main memory.
Hard Disk Drive
Direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material
Solid State storage device
stores data in memory chips rather than on hard disk drives or optical media
storage area network
high-speed, special-purpose network that integrates different types of data storage devices into a single storage system and connects that to computing resources across an entire organization.
-keyboard and mouse
-motion-sensing input
-scanning devices
-optical data readers
-magnetic stripe cards
-chip cards
-point-of-sale devices
examples of input devices
output devices
-screens
-printers
examples of output devices
-single-user(smartphones, desktops, tablets etc)
-multi-user(servers, mainframe, supercomputer)
Two types of computer systems
Green computing
a program convened with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
Sphere of influence
the scope of the problems and opportunities that the software addresses
-system
-application
Two types of software
operating systems
set of computer programs that controls the computer hardware and acts as an interface to application software
application software
to apply the power of the computer to enable people, workgroups, and the entire enterprise to solve problems and perform specific tasks
software bugs
a defect in a computer program that keeps it from performing as its users expect it to perform
-an org is operating unintegrated IS
-aquiring redundant systems
-wasting IS resources
Examples of computer related wastes
-missed opportunities
-increased hardware/software costs
-lost sales
Consequences of computer waste
-mishandling of computer output
-failures
-programing errors
-most caused by human error
computer-related mistakes
Decision making process
-gather information
-develop a problem statement
-consult those infloved as well as other appropiate resources
-identify options
-weigh the options
-choose an option
Libel: publishing an intentionally false written statement that is damaging to a person's or orgs reputation
privacy concern statement
Federal laws
Federal law permits employers to monitor email sent and received by employees
Email Monitoring - Is my work email private?
If an email system is used at a company, the employer owns it and is allowed to review its contents.
When I delete messages from my terminal, are they still in the system?
Yes. Email systems retain messages in memory even after they have been deleted.
Privacy Policy
type of is - Personal IS
includes IS that improve the productivity of individual users
type of is - Group IS
includes IS that improve communications and support collaboration among members of a workgroup
type of is - Enterprise IS
includes IS that organizations use to define structured interactions among their own employees and/or external customers, suppliers, government agencies, etc...