1/241
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
internet of things
a world where interconnected, internet-enabled devices/"things" can collect and share data without human interaction (machine to machine)
data
raw facts that describe characteristics of an event or object. ex: order date, amounts sold, phone numbers of customers
knowledge
skills, experience, and expertise, coupled with information and intelligence that creates a person's intellectual resources. (knowing what to do with data/info)
functional business areas
- sales
- marketing
- accounting
- finance
- operations
- human resources
sales
deals with customer data, sales report, commission data
marketing
deals with promotional data, sales data, advertising data
accounting
deals with transactional data, purchasing data, payroll data, taxation data
finance
deals with investment data, monetary data, reporting data
operations
deals with manufacturing data, distribution data, production data
human resources
deals with employee data, promotion data, vacation data
parts of a business information system
- people
- hardware
- software
- data
- networks
stakeholders
a person or group that has an interest or concern in an organization
interests of stakeholders
partners/suppliers - contracts/production
shareholders/investors - maximize profits, grow market share
community - associations, ethical recycling, increase employment
employees - fair compensation, job security, ethical treatment
customers - exceptional customer service, high quality products, ethical dealing
government - coherence to laws/regulations, increase employment, ethical taxation reporting
system
an organized purposeful structure that consists of interrelated, and interdependent elements
all _____ have a purpose or a goal
all _____ at their core, have processes
7 parts of a system
1) inputs
2) processes (that transform inputs)
3) outputs
4) controls
5) feedback
6) purpose/function that guides controls
7) time
5 parts of a process
1) inputs
2) processes
3) outputs
4) feedback
5) control
process
- looks for a particular end goal
- performance can be measured
system
- does not always produce a particular end
- performance can't always be measured
what computers are good at
- high speed, high volume, numerical computation
- fast, accurate, inexpensive communication within and between organizations
- storing huge amount of information in an easy to access, yet small space
- quick and inexpensive access to vast amounts of information, worldwide
what computers are bad at
- asking novel questions
- thinking creatively
- seeing patterns across non-digital data
- handling poorly structured, and open ended tasks
- non-verbal communication
- relationship building and maintenance
6 step rational decision making process
1) problem identification
2) data collection
3) solution generation
4) solution test
5) solution selection
6) solution implementation
problem identification
define the problems as clearly and precisely as possible
data collection
gather problem related data, including who, what, where, when, why and how. be sure to gather facts, not rumors or opinions about the problems
solution generation
detail every solution possible, including ideas that seem farfetched
solution test
evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?)
solution selection
select the solution that best solves the problem and meets the needs of the business
solution implementation
if the solution solves the problem, then the decisions made were correct, if not, the process should be repeated again
metrics
measurements that evaluate results to determine whether a project is meeting it's goals
critical success factors (CSF)
crucial step companies perform to achieve their goals and objectives, and implement their strategies
- create high quality products
- retain competitive advantages
- reduce product cost
- increase customer satisfaction
- hire and retain the best business professionals
key performance indicators (KPI)
quantifiable metrics a company uses to evaluate progress towards CSF's
- turnover rates of employees
- % of help desk calls answered within a minute
- number of product returns
- average customer spending
what-if analysis
checks the impact of a change in a variable on the model
- different variables are changed around until users understand the effects of various situations
sensitivity analysis
( a special case of what-if analysis) the study of the impact on other variables when one variable is changed repeatedly
goal-seeking analysis
finds the inputs necessary to achieve a goal such as a desired level of output (reverse of what-if and sensitivity analysis) repeatedly changing other variables until a certain value (goal) is achieved
optimization analysis
(extension of goal seeking analysis) find the optimum value for a target variable by changing other variables, subject specified constraints.
artificial intelligence
simulates human thinking and behavior, such as the ability to reason and learn. it's ultimate goal is to build a system that can mimic human intelligence
- increases speed and consistency of decision making
- solves problems with incomplete information
expert system
computerized advisory programs that imitate the reasoning precesses of of experts in solving difficult problems. Typically, they include a knowledge
intelligent agent
a special-purpose, knowledge based information system that accomplishes specific tasks on behalf of its users
problem
a situation that may be difficult, but may be solved, given the correct remedy
opportunity
a situation that may be used as an advantage
dilemma
a situation, though frustrating, cannot be avoided.
2 or more conflicting forces/priorities
structured decisions
have well designed methodology, are done regularly, and enough data available
ex: solving a math problem for which there is one correct answer
unstructured decisions
have unclear methodology, done rarely (or maybe for the first time), not enough data available
ex: estimating the future when variables are unknown, what should be in my novel?
decision making model
the process for concluding which decisions need to be made and how to find alternatives for those decisions
return on investment (ROI)
the earning power of a project
ROI = profitability/costs
is a KPI
benchmark
baseline values the system seeks to attain (optimal system results)
customer-facing
results in a product or a service that is received by an organization's external customer
business-facing
invisible to the external customer, but essential to the effective management of the business
bad processes
- takes too long
- wastes resources
- costs too much
- loses opportunities
- produces low quality
- leads to demoralized staff
causes of bad processes
- too many steps in the process
- decision makers don't have the info they need
- staff are lazy, don't know who to work with, or are protective of information, or of their perceived power
- old, obsolete information technology
- business functions are siloed
intellectual property
intangible property that is the result of creativity (such as patents or trademarks or copyrights)
copyright law
law that entitles the owner of a work to make and distribute reproductions of it
Hacker
Experts in technology who use their knowledge to break into computers/networks for profit or are motivated by the challenge
Virus writers
Write software with evil intent to annoy or cause real damage
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies
ethically challenged uses of IT
- individuals copy, use, and distribute software
- employees search organizational databases for sensitive corporate and personal info
- organizations collect, buy, and use info without checking the validity or accuracy
- individuals create and spread viruses that cause trouble for those using and maintaining IT systems
- individuals hack into computer systems to steal proprietary info
- employees destroy or steal proprietary organization info such as schematics, sketches, customer lists, and reports
Acceptable Use Policy
Expectations of conduct users must acknowledge to use an online service.
- not using the service as violating any law
- not attempting to break the security of any computer network or user
- not posting commercial messages to groups without prior permission
- not performing any non repudiation
Adware
Undesired software intended to advertise product to the user.
Spyware
Collects data about the user and transmits it over the internet without permission or knowledge
Ransomware
form of malicious software that infects your computer and asks for money
Hoaxes
Attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack onto their coworkers and friends, infecting many users along the way
Spoofing
The forging of a return address on an email so that the message appears to come from someone other than the actual sender. This is not a virus, but rather a way by which virus authors conceal their identity as they send out viruses
Phishing
Sending an email falsely claiming to be an established legitimate business in attempt to gain personal information for the purpose of identity theft
Pharming
Reroutes requests for legitimate websites to false websites that collect your information
Values
the ideas, beliefs, and attitudes about what is important that help guide the way you live
Morals
Codes of conduct governing behavior based on values
Ethics
The study of principles about what is right and wrong, fair and unfair.
Laws
society's values and standards that are enforceable in the courts
- values create laws
5 guiding principles of information ethics
Personal benefit
Social benefit
Principle of benevolence
Principle of paternalism
Principle of harm
personal benefit
Consider the extent to which an actual produces beneficial consequences for another person
social benefit
consider the extent to which an action produces beneficial consequences for society
Principle of benevolence
Help those in need
Principle of paternalism
Assist others in pursuing their best interests when they cannot do so themselves
Principle of harm
Do not harm others
Copyright protects:
Patents, trademarks, trade secrets (literary works, musical works, dramatic works, motion pictures)
"Fair Use" exceptions
1. If use is for non commercial purposes
2. If work is factual, rather than creative
3. If you use only a tiny, insubstantial amount of the material
4. If your use does not affect the potential market for or value of the protected work
IF function
=IF(logical_test, ["value_if_true"], ["value_if_false"])
NPER
calculates number of payments that will be made to pay off a loan, given the interest rate, payment amount, and original loan amount
RATE
calculates the interest rate earned for an investment given the number of payments made as a part of the investment, the payment amount, and the current value of the investment
PV
calculates the current value of an investment
FV
calculates the future value of an investment
Principle of autonomy
acknowledge a person's freedom over his/her actions or physical body.
Decision Support System (DSS)
Model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.
CPU/Processor
The actual hardware that interprets and executes the program (software) instructions and coordinates how all other hardware devices work together
EX: arithmetic, evaluation conditions, compare #, letters, characters
Processor Clock Speed
The speed of the internal clock on the CPU that sets the pace that operations go at within the computer's internal processes circuitry, measured in Ghz
(Ghz=frequency of electricity)
Primary Storage/RAM (Random Access Memory)
-the computer's main memory, contains RAM, cache memory, and ROM. It is directly accessible to the CPU.
-Stores data directly accessible by computer's CPU, access with minimal delay, stores data loaded by active programs and operating systems, uses electrical current
Secondary Data Storage (Hard disk/ External drive/Internal Hard Drive)
-Equipment designed to hold large volumes of data for long term storage, nonvolatile, do not lose their information when the computer is turned off, Hard disk or external drive
-Not directly connected with CPU, hard drive sends and receives data through an I/P bus, may pass through other memory before getting to CPU, not as fast, retain data when comp is off, stores magnetically
ROM(Read Only Memory)
Portion of a computer's primary storage that does not lose its contents when the computer is turned off, it contains essential programs that neither the computer, nor the user can erase, uses flash memory
Bit
Short for Binary digit, smallest element of data, either 0 off or 1 on
Byte
group of 8 bits, operate as single unit
KB
kilobyte 1,024 Bytes (10^3)
MB
megabyte, 1,024 KB (10^6)
GB
gigabyte, 1,024 MB (10^9 bytes)
TB
terabyte, 1,024 GB (10^12 bytes)
PB
petabyte, 1,024 TB (10^15 bytes)
Operating System
Controls the application software and manages how the hardware devices work together
Application Software
Used for specific information processing needs; used to solve specific problems or perform specific tasks
Humans create apps/programming lang
(Java, Python, C++, C#, VisualBasic) programming lang lets humans write instructions in source code telling computer what to do
Source Code
contains instructions written by a programer specifying the actions to be performed by computer software (looks like english)
EX: if score is >=4.0 then print "grade is A"
Object Code
looks like numbers- what the computer understands
EX: 10010010
Open Source
1) user owned, customizable, free, self/hired maintenance, world wide community of developers add to it.
2) Refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify