IT Management review for test PDF

Title IT Management review for test
Course Financial Management for IT Professionals
Institution Western Governors University
Pages 19
File Size 1.3 MB
File Type PDF
Total Downloads 43
Total Views 146

Summary

Notes from course work year 2021. WGU...


Description

CH1 Describe the information age and the differences between data, information, business intelligence, and knowledge Information age - The present time, during which infinite quantities of facts are widely available to anyone who can use a computer Data - Raw facts that describe the characteristics of an event or object Information - Data converted into a meaningful and useful context Business intelligence - Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making Knowledge - Skills, experience, and expertise coupled with information and intelligence that creates a person’s intellectual resources Identify the different departments in a company and why they must work together to achieve success

Explain systems thinking and how management information systems enable business communications Systems thinking – A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. Feedback is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter’s actions. Feedback helps the system maintain stability Management Information Systems (MIS) – A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving Ch2 Describe Porter’s Five Forces Model and explain each of the five forces?

Porter’s Five Forces Model analyzes the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry. Compare Porter’s three generic strategies

(1) broad cost leadership, (2) broad differentiation, and (3) focused strategy. Broad strategies reach a large market segment. Focused strategies target a niche market. Focused strategies concentrate on either cost leadership or differentiation

Ch3 Identify how an organization can use business process reengineering to improve its business? Businesses gain a competitive edge when they minimize costs and streamline business processes Explain supply chain management and its role in business? The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability Explain customer relationship management systems and how they can help organizations understand their customers?

involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization's profitability Ch4 Define the primary MIS roles along with their associated responsibilities?

Define critical success factors (CSFs) and key performance indicators (KPIs) and explain how managers use them to measure the success of MIS projects?

Ch5 5.1. Explain information ethics and its associated issues. Information ethics govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes among competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or correct decision. 5.2. Describe information security and the difference between hackers and viruses.

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Information security is perhaps the most fundamental and critical of all the technologies/disciplines an organization must have squarely in place to execute its business strategy. Without solid security processes and procedures, none of the other technologies can develop business advantages. Understanding how to secure information systems is critical to keeping downtime to a minimum and uptime to a maximum. Hackers and viruses are two of the hottest issues currently facing information security. Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge. A virus is software written with malicious intent to cause annoyance or damage.

Committee of Sponsoring Organizations COSO

Ch6

Describe a database, a database management system, and the relational database model

Identify the business advantages of a relational database

Explain the business benefits of a data-driven website Data-driven website advantages Easy to manage content Easy to store large amounts of data Easy to eliminate human errors Ch8

Ch11 Describe customer relationship management along with its associated benefits and challenges? Managing all aspects of a customers relationship to Increase customer loyalty and retention and an organization's profitability. Challenges: customer has more power than ever. Differentiate between operational and analytical customer relationship management Operational CRM – Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers Analytical CRM – Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers Identify the three current trends extending customer relationship management Supplier relationship management (SRM) Partner relationship management (PRM) Employee relationship management (ERM)

Summarize the importance of enterprise resource planning systems? integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide information on all business

Ch12 Describe the role information plays in enterprise resource planning? ERP systems collect data from across an organization and correlates the data generating an enterprisewide view Identify the core and extended areas of enterprise resource planning? Enterprise resource planning (ERP) integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprisewide information about all business operations. The current generation of ERP, ERP-II, is composed of two primary components—core and extended. Core ERP components are the traditional components included in most ERP systems and primarily focus on internal operations. Extended ERP components are the extra components that meet organizational needs not covered by the core components and primarily focus on external operations Discuss the current technologies organizations are integrating in enterprise resource planning systems? The goal of ERP is to integrate all of the organizational systems into one fully functioning, highperformance system that is capable of meeting all business needs and user requirements. Of course, this goal is incredibly difficult to achieve because businesses and technologies experience rapid change, and ERP must support mobility, cloud, SaaS, and tiered architectures. Ch14

Ch15

Ch16 Explain the different wireless network categories

Explain the different wireless network business applications

Explain why a company would implement a service-oriented architecture. Service oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services. SOA ensures that MIS systems can adapt quickly, easily, and economically to support rapidly changing business needs. SOA promotes a scalable and flexible enterprise architecture that can implement new or reuse existing MIS components, creating connections among disparate applications and systems. It is important to understand that SOA is not a concrete architecture; it is a way of thinking that leads to a concrete architecture. Ch19 Explain project management and the primary reasons project fail?

Primary reasons for project failure Unclear or missing business requirements Skipping SDLC phases

Failure to manage project scope Scope creep Feature creep Failure to manage project plan Changing technology Identify the primary project planning diagrams? PERT

Gantt Identify the three different types of outsourcing along with their benefits and challenges? Onshore outsourcing—engaging another company within the same country for services. Nearshore outsourcing—contracting an outsourcing arrangement with a company in a nearby country. Offshore outsourcing—using organizations from developing countries to write code and develop systems. The many benefits associated with outsourcing include increased quality and efficiency of a process, service, or function; reduction of operating expenses and exposure to risks involved with large capital investments; and access to the outsourcing service provider’s expertise, economies of scale, best practices, and advanced technologies. Outsourcing comes with several challenges, including length of contracts, losing competitive advantages, and risking a breach of confidential information.

Plug ins: Explain operations management role in business Forecasting Capacity planning Scheduling Managing inventory Assuring quality Motivating and training employees Locating facilities Describe the correlation between operations management and information technology What: What resources will be needed and in what amounts? When: When should the work be scheduled? Where: Where will the work be performed? How: How will the work be done? Who: Who will perform the work? Describe the five characteristics of competitive priorities Cost Quality Delivery Flexibility Service Explain why businesses use trends to assess the future Obtaining a broad view of emerging trends and new technologies as they relate to business can help an organization anticipate and prepare for the future

Identify the technologies that will have the greatest impact on future business

The Digital Mesh Smart Machines The NEW IT Reality

ITIL The Information Technology Infrastructure Library (ITIL) is the most widely adopted approach for information technology service management (ITSM) in the world. ITIL provides a nononsense, straightforward construct to recognize, plan, implement, and support IT services in a business. ITIL means changing the way the business does IT, so that IT services are developed and delivered in a way that is business focused and value driven. ITIL was created to provide for more consistent practices for all aspects of the ITSM lifecycle that could assist in providing predictable and efficient service levels. The books are lifecycle stages that the ITIL practice addresses: • • •

Service Strategy (SS) Service Design (SD) Service Transition (ST)

Section 3: Readings and Resources Delivering Value with Systems and Applications 21% of assessment 9, 11, 12, 14 Section 4: Readings and Resources Development Methodologies and Product Delivery 29% of assessment 2, 3, 4, 17, 18, 19 Section 7: Readings and Resources Traits of Effective IT Leaders - 12% of assessment Different Text books, Plug-in B8, B12 Section 6: Readings and Resources Ethical Behaviors and Regulatory Compliance - 16% of assessment 5, Plug-in B7, B9, B11, ITIL Section 2: Readings and Resources Information Systems Terminology- 12% of assessment

1, 6, 8, 16, Plug-in B1, B2, B3, and B5 Section 5 Information Security - 10% of assessment 5 Plug-in B4, B6

7, 10, 13, 15,

Plug – B3 Business Intelligence ITIL CMMI SDLC. (know every phase), Testing phase – Involves bringing all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all of the business requirements defined in the analysis phase Implementation phase – Involves placing the system into production so users can begin to perform actual business operations with it Design phase – Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation Maintenance phase – Involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet its business goals Planning phase – Establishes a high-level plan of the intended project and determines project goals Analysis phase – Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system Development phase – Involves taking all of the detailed design documents from the design phase and transforming them into the actual system

Testing Implementation Analysis Maintenance Development Design Planning ITIL (strategy, design, transition, operation), • Service Strategy (SS) how IT Services will be utilized to enable IT to achieve the required objectives. It also explains how IT services underpin the overall business strategy • Service Design (SD) stage in the lifecycle which converts a service strategy into a plan to deliver the objectives of the business. • Service Transition (ST) move services and service changes into operational use • Service Operation ensure that the required IT services are delivered efficiently and effectively as per the service level agreements to the business users and customers.

Network Topography

Bus network topology -- Also known as backbone network topology, this configuration connects all devices to a main cable via drop lines. The advantages of bus network topology lie in its simplicity, as there is less cable required than in alternative topologies, which makes for easy installation. Mesh network topology -- A dedicated point-to-point link connects each device on the network to another device on the network, only carrying data between two devices. Ring network topology -- Two dedicated point-to-point links connect a device to the two devices located on either side of it, creating a ring of devices through which data is forwarded via repeaters until it reaches the target device. Star network topology -- The most common network topology, star topology connects each device in the network to a central hub. Devices can only communicate with each other indirectly through the central hub. Hybrid network topology -- Any combination of two or more topologies is a hybrid topology.

Tree network topology -- This topology consists of a parent-child hierarchy in which star networks are interconnected via bus networks. Nodes branch out linearly from one root node, and two connected nodes only share one mutual connection.

RAM vs ROM Random access memory (RAM) is the computer’s primary working memory, LIKE DODGE TRUCK. RAM does not retain its contents when the power to the computer is switched of. Main does not retain! Read-only memory (ROM) is the portion of a computer’s primary storage that does not lose its contents when one switches of the power. AI and the 5 main types Simulates human intelligence such as the ability to reason and learn

2. Neural Network – Attempts to emulate the way the human brain works 5. Virtual reality - A computer-simulated environment that can be a simulation of the real world or an imaginary world 3. Genetic algorithm – An artificial intelligent system that mimics the evolutionary, survival-of-thefittest process to generate increasingly better solutions to a problem Mutation – success of outcome 1. Expert system – Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems 4. Intelligent agent – Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users Software development Methodologies Rational unified process (RUP)- Provides a framework for breaking down the development of software into four gates Gate One: Inception Gate Two: Elaboration Gate Three: Construction Gate Four: Transition Scrum- Uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal Rapid application development (RAD)- extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process Extreme programming- Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete Waterfall- sequence of phases in which the output of each phase becomes the input for the next Agile- early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements E-Policies

Acceptable use policy. requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Social media policy. outlining the corporate guidelines or principles governing employee online communications. Workplace monitoring policy tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed Ethical computer use policy. contains general principles to guide computer user behavior Information privacy policy. contains general principles regarding information privacy Email privacy policy. details the extent to which email messages may be read by others.

eBusiness Models

B2C example is Carfax offers car buyers detailed histories of used vehicles for a fee C2B example is customers of Priceline.com, who set their own prices for items such as airline tickets or hotel rooms and wait for a seller to decide whether to supply them. C2C example is an EBay auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically. ERP Enterprise resource planning (ERP) integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprisewide information about all business operations. The current generation of ERP, ERP-II, is composed of two primary components—core and extended. Core ERP components are the traditional components included in most ERP systems and primarily focus on internal operations. Extended ERP components are the extra components that meet organizational needs not covered by the core components and primarily focus on external operations

Global Trends According to the World Future Society, the following trends have the potential to change our world, our future, and our lives. 

The world’s population will double in the next 40 years.



People in developed countries are living longer.



The growth in information industries is creating a knowledge-dependent global society.



The global economy is becoming more integrated.



The economy and society are dominated by technology.



The pace of technological innovation is increasing.



Time is becoming one of the world’s most precious commodities.

Supply Chain Management Supply chain management performs three main business processes): Materials flow from suppliers and their upstream suppliers at all levels. Materials are transformed into semifinished and finished products—the organization’s own production processes. Products are distributed to customers and their downstream customers at all levels. The bullwhip effect occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain Customer Relationship Management

is a means of managing all aspects of a customer’s relationship with an organization to increase c...


Similar Free PDFs