Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
88 Cards in this Set
- Front
- Back
Moore's Law |
A law created by Gordon Moore, states that the number of transistors per square inch on the integrated chip doubles every 18 months. His prediction proved accurate in the 40 years since it was made. Sometimes it's stated that the performance of a computer doubles every 18 months. Although not strictly true, this version gives the just of the idea |
|
Nonroutine cognitive thinking |
Part of MIS that Helps accounting, finance, information system majors adapt to changing technology and shifting demand of the workforce |
|
Nonroutine cognitive skills (4) |
Abstract reasoning systems thinking collaboration ability to experiment |
|
Abstract reasoning |
Construct a model or representation |
|
Systems thinking |
Model system components and show how inputs and outputs relate to one another |
|
Collaboration |
Develop ideas and plans with others. Provide and receive critical feedback |
|
Ability to experiment |
Create and test promising new alternatives, consistent with available resources |
|
System |
A group of components that interact to achieve some purpose |
|
Information system components (5) |
Iteration feedback accomplish task within time and budget promoting growth increase team satisfaction |
|
Iteration |
Track many versions of many documents and other work product |
|
Feedback |
Provide easy to use and readily available multiparty communication |
|
Accomplish task within time and budget |
Check tasks, schedules, budgets, and other project metadata. account for the report progress and status |
|
Promote team growth |
Promote team |
|
Increase team satisfaction |
Provide for team and member recognition |
|
Strong passwords: (5) |
-Has 10 or more characters, 12 is even better -does not contain your username, real name, company name -does not contain a complete dictionary word in any language -is different from previous passwords you have used -contains both upper and lower case letters, numbers, and special characters |
|
Strong passwords: (5) |
-Has 10 or more characters, 12 is even better -does not contain your username, real name, company name -does not contain a complete dictionary word in any language -is different from previous passwords you have used -contains both upper and lower case letters, numbers, and special characters |
|
Difference between information technology and information systems |
-information-technology refers to the products, methods, inventions, and standards that are used for the purpose of producing information; hardware, software, and data components -information systems is an assembly of hardware, software, Data, procedures, and people that Produce information: information technology drives the development of new information systems |
|
Business process |
A network of activities, actors, rolls, repositories, and data and sequence flows that interact to accomplish a business function |
|
Swim lane format |
A graphical arrangement in which all the activities for a given role or job type are shown in the single vertical Lane. |
|
Swim lane format |
A graphical arrangement in which all the activities for a given role or job type are shown in the single vertical Lane. |
|
Components of swimlane format |
Each swimmer and has a tube of these, which are specific tests that need to be accomplished as part of the process. Our role is a subset of activities in the business process that was performed by an actor, which is a person, group, department, organization, or information system |
|
Swim lane format |
A graphical arrangement in which all the activities for a given role or job type are shown in the single vertical Lane. |
|
Components of swimlane format |
Each swimmer and has a tube of these, which are specific tests that need to be accomplished as part of the process. Our role is a subset of activities in the business process that was performed by an actor, which is a person, group, department, organization, or information system |
|
Information is: |
Knowledge derived from data; information is data presented in a meaningful context |
|
Swim lane format |
A graphical arrangement in which all the activities for a given role or job type are shown in the single vertical Lane. |
|
Components of swimlane format |
Each swimmer and has a tube of these, which are specific tests that need to be accomplished as part of the process. Our role is a subset of activities in the business process that was performed by an actor, which is a person, group, department, organization, or information system |
|
Information is: |
Knowledge derived from data; information is data presented in a meaningful context |
|
Data characteristics for quality information (5) |
-Accurate -timely -relevant to context and subject -just barely sufficient -worth its cost |
|
Swim lane format |
A graphical arrangement in which all the activities for a given role or job type are shown in the single vertical Lane. |
|
Components of swimlane format |
Each swimmer and has a tube of these, which are specific tests that need to be accomplished as part of the process. Our role is a subset of activities in the business process that was performed by an actor, which is a person, group, department, organization, or information system |
|
Information is: |
Knowledge derived from data; information is data presented in a meaningful context |
|
Data characteristics for quality information (5) |
-Accurate -timely -relevant to context and subject -just barely sufficient -worth its cost |
|
Organizational strategy to determine information systems (5) |
Industry structure competitive strategy value chains business processes information systems |
|
Porters five forces model for industry structure |
Bargaining power of customers threat of substitution Bargaining power of suppliers threat of new entrants Rivalry Two sides: competitive forces and bargaining power forces |
|
Porters four competitive strategies |
|
|
Porters value chain |
|
|
The Internet of things |
The idea that objects or become connected to the Internet so that they can interact with other devices, applications, or services |
|
Self driving car |
Uses a variety of sensors to navigate Like a traditional car but without human interaction |
|
Self driving car It will:(4) |
Uses a variety of sensors to navigate Like a traditional car but without human interaction It will make things easier cheaper safer and disrupt businesses |
|
Hierarchy of data elements from top to bottom |
Table or file records or Rows fields or columns bytes or characters |
|
Database management system DBMS |
The program is to create, process, administer a database |
|
DBMS for IBM Microsoft and the Oracle Corporation and open source one |
IBM: DB2 Microsoft: Access and SQL server Oracle Corporation: Oracle database Open source: MySQL |
|
Database application |
A collection of forms, reports, queries and application programs that serves as an intermediary between users and database data |
|
Database application |
A collection of forms, reports, queries and application programs that serves as an intermediary between users and database data |
|
Traditional database applications |
Written an object oriented languages such a C++ and Visual Basic. They are thick applications that need to be installed on use of computers |
|
Browser database applications |
Forms, reports, and queries displayed in processed using HTML and most recently HTML5, CSS3 and JavaScript . These are thin client applications and don't need to be installed |
|
The cloud |
The elastic leasing of pool computer resources over the Internet |
|
Platform as a service (PaaS) |
Vendors provide hosted computers, and operating system, and possibly a DBMS |
|
Infrastructure as a service (IaaS) |
The cloud hosting of a bare server computer or data storage |
|
Infrastructure as a service (IaaS) |
The cloud hosting of a bare server computer or data storage |
|
Software as a service (SaaS) |
Leasing hardware infrastructure, operating systems, application programs to another organization |
|
Virtual private network (VPN) |
A WAN connection alternative that uses the Internet or private Internet to create the appearance of private point to point connections. In the IT world, the term virtual mean something that appears to exist that does not exist in fact. Here VPN uses the public Internet to create the appearance of a private connection |
|
Virtual private cloud VPC |
A subset of the public cloud that is highly restricted, secure access |
|
Personal information system |
Information system used by a single individual |
|
Personal information system |
Information system used by a single individual |
|
Workgroup information system |
Supports a particular department or work group |
|
Personal information system |
Information system used by a single individual |
|
Workgroup information system |
Supports a particular department or work group |
|
Inter – enterprise information systems |
Support one or more inter- enterprise processes |
|
Personal information system |
Information system used by a single individual |
|
Workgroup information system |
Supports a particular department or work group |
|
Inter – enterprise information systems |
Support one or more inter- enterprise processes |
|
Enterprise information systems |
Support cross functional processes and activities in multiple departments |
|
Information silo |
A condition that exists when data is isolated in separated information systems. Often leads to data integrity problems |
|
Information silo |
A condition that exists when data is isolated in separated information systems. Often leads to data integrity problems |
|
Business process reengineering |
The activity of all three existing in designing new business processes to take advantage of new information systems technology |
|
Unstructured decision |
A type of decision for which there is no agreed on decision-making process |
|
Unstructured decision |
A type of decision for which there is no agreed on decision-making process |
|
Structured decision |
Type a decision for which there is a formalized and accepted method for making that decision |
|
Synchronous communication |
Information exchange that occurs when members of a work team me at the same time such as face-to-face meetings or conference calls |
|
Synchronous communication |
Information exchange that occurs when members of a work team me at the same time such as face-to-face meetings or conference calls |
|
Asynchronous communication |
Information exchange that occurs when members of a work team do not meet at the same time, such as those who work different shifts |
|
As-Is model |
A model that represents the current situation and processes |
|
As-Is model |
A model that represents the current situation and processes |
|
Stored procedure |
A computer program stored in the database that is used to enforce business rules |
|
As-Is model |
A model that represents the current situation and processes |
|
Stored procedure |
A computer program stored in the database that is used to enforce business rules |
|
Alternatives for sharing content (3) |
No control version management version control |
|
As-Is model |
A model that represents the current situation and processes |
|
Stored procedure |
A computer program stored in the database that is used to enforce business rules |
|
Alternatives for sharing content (3) |
No control version management version control |
|
No control |
Email with attachments shared files on the server |
|
As-Is model |
A model that represents the current situation and processes |
|
Stored procedure |
A computer program stored in the database that is used to enforce business rules |
|
Alternatives for sharing content (3) |
No control version management version control |
|
No control |
Email with attachments shared files on the server |
|
Version management |
Google docs windows web apps Microsoft office |
|
Version control |
Microsoft sharepoint |