Essentials of MIS (14th Edition) - Detailed Cheat Sheet (Chapters 1-8)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Flashcards for review based on the MIS cheat sheet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

What is a key business objective of Information Systems?

Operational Excellence: Improve efficiency for higher profitability.

2
New cards

How can IS enable competitive advantage?

By reducing costs, increasing productivity, and delivering better service.

3
New cards

What is a digital firm?

A firm where business relationships, core processes, and corporate assets are digitally managed.

4
New cards

What are the three dimensions of Information Systems?

Technology, Organizations, and Management.

5
New cards

What are Business Processes?

Structured activities or tasks that produce a specific service or product.

6
New cards

What does TPS stand for, and what is its primary function?

Transaction Processing System; Supports operational level and records routine transactions.

7
New cards

What is the purpose of MIS?

Provides summarized reports for middle managers to monitor performance.

8
New cards

What decisions does DSS support?

Semi-structured decisions with simulations and 'what-if' analysis.

9
New cards

What level of management does ESS serve?

Senior Management

10
New cards

What does ERP stand for, and what does it do?

Enterprise Resource Planning; Integrates business processes into a single IT system.

11
New cards

What is SCM, and what is its function?

Supply Chain Management; Manages relationships with suppliers and logistics.

12
New cards

What is the purpose of CRM?

Customer Relationship Management; Helps manage customer data and interactions.

13
New cards

Name some collaboration and social tools mentioned.

Microsoft Teams, Slack, Google Docs, Zoom.

14
New cards

Name one of Porter's Five Forces.

New market entrants – threat of new competitors.

15
New cards

Give an example of a company that uses a low-cost leadership strategy.

Walmart

16
New cards

Give an example of a company that uses a product differentiation strategy.

Apple

17
New cards

What does the Value Chain Model identify.

Primary and support activities that add value and margin to a product.

18
New cards

What are network effects?

Increase value as users increase (network-based strategies).

19
New cards

What is an ethical dilemma in IS?

Balancing rights of users with responsibilities of organizations.

20
New cards

What are the five moral dimensions of Information Systems?

Information rights/obligations, Property rights/obligations, Accountability & control, System quality, Quality of life.

21
New cards

Give an example of a privacy law.

GDPR (EU), HIPAA (US)

22
New cards

Give examples of threats to privacy discussed in the notes.

Cookies, spyware, tracking software.

23
New cards

Give examples of intellectual property tools.

Copyrights, trademarks, patents.

24
New cards

What are the key components of IT infrastructure?

Hardware, software, networking, data management, services.

25
New cards

Define virtualization.

Running multiple OS instances on one machine.

26
New cards

What is cloud computing?

On-demand resources via the internet (IaaS, PaaS, SaaS).

27
New cards

What file system issues does DBMS solve?

Data redundancy, inconsistency, poor security.

28
New cards

Describe the relational model.

Tables (relations) with rows (records) and columns (attributes).

29
New cards

What are the benefits of normalization?

Minimizing redundancy in databases.

30
New cards

Difference between a data warehouse and a data mart?

Warehouse = enterprise-wide; Mart = departmental.

31
New cards

What does OLAP stand for?

Online Analytical Processing: Multidimensional analysis.

32
New cards

Describe the difference between a LAN and a WAN.

LAN has a Limited Area while a WAN has a Wide Area.

33
New cards

What are protocols?

Set of rules (e.g., TCP/IP).

34
New cards

What is VoIP?

Calls over the internet.

35
New cards

List common security risks.

Sniffing, spoofing, man-in-the-middle attacks.

36
New cards

List some common threats.

Viruses, worms, Trojan horses, spyware, ransomware.

37
New cards

Name some security technologies.

Firewalls, antivirus, encryption, authentication.

38
New cards

What should security policies include?

Acceptable use policy, security audit.

39
New cards

What is the purpose of Business Continuity Planning?

Recovery, backups, alternative facilities.

40
New cards

What does the mnemonic RIP QA related to?

Moral Dimensions: Rights, IP, Privacy, Quality, Accountability