COMPLETE MIS 180 Final Study Guide (Meader SDSU)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/241

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

242 Terms

1
New cards

internet of things

a world where interconnected, internet-enabled devices/"things" can collect and share data without human interaction (machine to machine)

2
New cards

data

raw facts that describe characteristics of an event or object. ex: order date, amounts sold, phone numbers of customers

3
New cards

knowledge

skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources. (knowing what to do with data/info)

4
New cards

functional business areas

- sales

- marketing

- accounting

- finance

- operations

- human resources

5
New cards

sales

deals with customer data, sales report, commission data

6
New cards

marketing

deals with promotional data, sales data, advertising data

7
New cards

accounting

deals with transactional data, purchasing data, payroll data, taxation data

8
New cards

finance

deals with investment data, monetary data, reporting data

9
New cards

operations

deals with manufacturing data, distribution data, production data

10
New cards

human resources

deals with employee data, promotion data, vacation data

11
New cards

parts of a business information system

- people

- hardware

- software

- data

- networks

12
New cards

stakeholders

a person or group that has an interest or concern in an organization

13
New cards

interests of stakeholders

partners/suppliers - contracts/production

shareholders/investors - maximize profits, grow market share

community - associations, ethical recycling, increase employment

employees - fair compensation, job security, ethical treatment

customers - exceptional customer service, high quality products, ethical dealing

government - coherence to laws/regulations, increase employment, ethical taxation reporting

14
New cards

system

an organized purposeful structure that consists of interrelated, and interdependent elements

all _____ have a purpose or a goal

all _____ at their core, have processes

15
New cards

7 parts of a system

1) inputs

2) processes (that transform inputs)

3) outputs

4) controls

5) feedback

6) purpose/function that guides controls

7) time

16
New cards

5 parts of a process

1) inputs

2) processes

3) outputs

4) feedback

5) control

17
New cards

process

- looks for a particular end goal

- performance can be measured

18
New cards

system

- does not always produce a particular end

- performance can't always be measured

19
New cards

what computers are good at

- high speed, high volume, numerical computation

- fast, accurate, inexpensive communication within and between organizations

- storing huge amount of information in an easy to access, yet small space

- quick and inexpensive access to vast amounts of information, worldwide

20
New cards

what computers are bad at

- asking novel questions

- thinking creatively

- seeing patterns across non-digital data

- handling poorly structured, and open ended tasks

- non-verbal communication

- relationship building and maintenance

21
New cards

6 step rational decision making process

1) problem identification

2) data collection

3) solution generation

4) solution test

5) solution selection

6) solution implementation

22
New cards

problem identification

define the problems as clearly and precisely as possible

23
New cards

data collection

gather problem related data, including who, what, where, when, why and how. be sure to gather facts, not rumors or opinions about the problems

24
New cards

solution generation

detail every solution possible, including ideas that seem farfetched

25
New cards

solution test

evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?)

26
New cards

solution selection

select the solution that best solves the problem and meets the needs of the business

27
New cards

solution implementation

if the solution solves the problem, then the decisions made were correct, if not, the process should be repeated again

28
New cards

metrics

measurements that evaluate results to determine whether a project is meeting it's goals

29
New cards

critical success factors (CSF)

crucial step companies perform to achieve their goals and objectives, and implement their strategies

- create high quality products

- retain competitive advantages

- reduce product cost

- increase customer satisfaction

- hire and retain the best business professionals

30
New cards

key performance indicators (KPI)

quantifiable metrics a company uses to evaluate progress towards CSF's

- turnover rates of employees

- % of help desk calls answered within a minute

- number of product returns

- average customer spending

31
New cards

what-if analysis

checks the impact of a change in a variable on the model

- different variables are changed around until users understand the effects of various situations

32
New cards

sensitivity analysis

( a special case of what-if analysis) the study of the impact on other variables when one variable is changed repeatedly

33
New cards

goal-seeking analysis

finds the inputs necessary to achieve a goal such as a desired level of output (reverse of what-if and sensitivity analysis) repeatedly changing other variables until a certain value (goal) is achieved

34
New cards

optimization analysis

(extension of goal seeking analysis) find the optimum value for a target variable by changing other variables, subject specified constraints.

35
New cards

artificial intelligence

simulates human thinking and behavior, such as the ability to reason and learn. it's ultimate goal is to build a system that can mimic human intelligence

- increases speed and consistency of decision making

- solves problems with incomplete information

36
New cards

expert system

computerized advisory programs that imitate the reasoning precesses of of experts in solving difficult problems. Typically, they include a knowledge

37
New cards

intelligent agent

a special-purpose, knowledge based information system that accomplishes specific tasks on behalf of its users

38
New cards

problem

a situation that may be difficult, but may be solved, given the correct remedy

39
New cards

opportunity

a situation that may be used as an advantage

40
New cards

dilemma

a situation, though frustrating, cannot be avoided.

2 or more conflicting forces/priorities

41
New cards

structured decisions

have well designed methodology, are done regularly, and enough data available

ex: solving a math problem for which there is one correct answer

42
New cards

unstructured decisions

have unclear methodology, done rarely (or maybe for the first time), not enough data available

ex: estimating the future when variables are unknown, what should be in my novel?

43
New cards

decision making model

the process for concluding which decisions need to be made and how to find alternatives for those decisions

44
New cards

return on investment (ROI)

the earning power of a project

ROI = profitability/costs

is a KPI

45
New cards

benchmark

baseline values the system seeks to attain (optimal system results)

46
New cards

customer-facing

results in a product or a service that is received by an organization's external customer

47
New cards

business-facing

invisible to the external customer, but essential to the effective management of the business

48
New cards

bad processes

- takes too long

- wastes resources

- costs too much

- loses opportunities

- produces low quality

- leads to demoralized staff

49
New cards

causes of bad processes

- too many steps in the process

- decision makers don't have the info they need

- staff are lazy, don't know who to work with, or are protective of information, or of their perceived power

- old, obsolete information technology

- business functions are siloed

50
New cards

intellectual property

intangible property that is the result of creativity (such as patents or trademarks or copyrights)

51
New cards

copyright law

law that entitles the owner of a work to make and distribute reproductions of it

52
New cards

Hacker

Experts in technology who use their knowledge to break into computers/networks for profit or are motivated by the challenge

53
New cards

Virus writers

Write software with evil intent to annoy or cause real damage

54
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies

55
New cards

ethically challenged uses of IT

- individuals copy, use, and distribute software

- employees search organizational databases for sensitive corporate and personal info

- organizations collect, buy, and use info without checking the validity or accuracy

- individuals create and spread viruses that cause trouble for those using and maintaining IT systems

- individuals hack into computer systems to steal proprietary info

- employees destroy or steal proprietary organization info such as schematics, sketches, customer lists, and reports

56
New cards

Acceptable Use Policy

Expectations of conduct users must acknowledge to use an online service.

- not using the service as violating any law

- not attempting to break the security of any computer network or user

- not posting commercial messages to groups without prior permission

- not performing any non repudiation

57
New cards

Adware

Undesired software intended to advertise product to the user.

58
New cards

Spyware

Collects data about the user and transmits it over the internet without permission or knowledge

59
New cards

Ransomware

form of malicious software that infects your computer and asks for money

60
New cards

Hoaxes

Attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack onto their coworkers and friends, infecting many users along the way

61
New cards

Spoofing

The forging of a return address on an email so that the message appears to come from someone other than the actual sender. This is not a virus, but rather a way by which virus authors conceal their identity as they send out viruses

62
New cards

Phishing

Sending an email falsely claiming to be an established legitimate business in attempt to gain personal information for the purpose of identity theft

63
New cards

Pharming

Reroutes requests for legitimate websites to false websites that collect your information

64
New cards

Values

the ideas, beliefs, and attitudes about what is important that help guide the way you live

65
New cards

Morals

Codes of conduct governing behavior based on values

66
New cards

Ethics

The study of principles about what is right and wrong, fair and unfair.

67
New cards

Laws

society's values and standards that are enforceable in the courts

- values create laws

68
New cards

5 guiding principles of information ethics

Personal benefit

Social benefit

Principle of benevolence

Principle of paternalism

Principle of harm

69
New cards

personal benefit

Consider the extent to which an actual produces beneficial consequences for another person

70
New cards

social benefit

consider the extent to which an action produces beneficial consequences for society

71
New cards

Principle of benevolence

Help those in need

72
New cards

Principle of paternalism

Assist others in pursuing their best interests when they cannot do so themselves

73
New cards

Principle of harm

Do not harm others

74
New cards

Copyright protects:

Patents, trademarks, trade secrets (literary works, musical works, dramatic works, motion pictures)

75
New cards

"Fair Use" exceptions

1. If use is for non commercial purposes

2. If work is factual, rather than creative

3. If you use only a tiny, insubstantial amount of the material

4. If your use does not affect the potential market for or value of the protected work

76
New cards

IF function

=IF(logical_test, ["value_if_true"], ["value_if_false"])

77
New cards

NPER

calculates number of payments that will be made to pay off a loan, given the interest rate, payment amount, and original loan amount

78
New cards

RATE

calculates the interest rate earned for an investment given the number of payments made as a part of the investment, the payment amount, and the current value of the investment

79
New cards

PV

calculates the current value of an investment

80
New cards

FV

calculates the future value of an investment

81
New cards

Principle of autonomy

acknowledge a person's freedom over his/her actions or physical body.

82
New cards

Decision Support System (DSS)

Model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.

83
New cards

CPU/Processor

The actual hardware that interprets and executes the program (software) instructions and coordinates how all other hardware devices work together

EX: arithmetic, evaluation conditions, compare #, letters, characters

84
New cards

Processor Clock Speed

The speed of the internal clock on the CPU that sets the pace that operations go at within the computer's internal processes circuitry, measured in Ghz

(Ghz=frequency of electricity)

85
New cards

Primary Storage/RAM (Random Access Memory)

-the computer's main memory, contains RAM, cache memory, and ROM. It is directly accessible to the CPU.

-Stores data directly accessible by computer's CPU, access with minimal delay, stores data loaded by active programs and operating systems, uses electrical current

86
New cards

Secondary Data Storage (Hard disk/ External drive/Internal Hard Drive)

-Equipment designed to hold large volumes of data for long term storage, nonvolatile, do not lose their information when the computer is turned off, Hard disk or external drive

-Not directly connected with CPU, hard drive sends and receives data through an I/P bus, may pass through other memory before getting to CPU, not as fast, retain data when comp is off, stores magnetically

87
New cards

ROM(Read Only Memory)

Portion of a computer's primary storage that does not lose its contents when the computer is turned off, it contains essential programs that neither the computer, nor the user can erase, uses flash memory

88
New cards

Bit

Short for Binary digit, smallest element of data, either 0 off or 1 on

89
New cards

Byte

group of 8 bits, operate as single unit

90
New cards

KB

kilobyte 1,024 Bytes (10^3)

91
New cards

MB

megabyte, 1,024 KB (10^6)

92
New cards

GB

gigabyte, 1,024 MB (10^9 bytes)

93
New cards

TB

terabyte, 1,024 GB (10^12 bytes)

94
New cards

PB

petabyte, 1,024 TB (10^15 bytes)

95
New cards

Operating System

Controls the application software and manages how the hardware devices work together

96
New cards

Application Software

Used for specific information processing needs; used to solve specific problems or perform specific tasks

97
New cards

Humans create apps/programming lang

(Java, Python, C++, C#, VisualBasic) programming lang lets humans write instructions in source code telling computer what to do

98
New cards

Source Code

contains instructions written by a programer specifying the actions to be performed by computer software (looks like english)

EX: if score is >=4.0 then print "grade is A"

99
New cards

Object Code

looks like numbers- what the computer understands

EX: 10010010

100
New cards

Open Source

1) user owned, customizable, free, self/hired maintenance, world wide community of developers add to it.

2) Refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify