MIS Exam 2 Study Guide PDF

Title MIS Exam 2 Study Guide
Course Management Information System
Institution Iowa State University
Pages 3
File Size 133.9 KB
File Type PDF
Total Downloads 2
Total Views 138

Summary

Professor Beard...


Description

Data and Information Management Rational Database Model: is usually designed with a number of related tables. Each of these tables contains records (listed in rows) and attributes (listed in columns). Entity: person, place, thing or event Instant of an entity: refers to each row or record in a relational table, which is a specific, unique representation of the entity Attribute: each characteristic or quality of a particular entity Primary Key: a field in a database that uniquely identifies each record so that it can be retrieved, updated and sorted Secondary Key: a field that has some identifying information, but typically does not identify the record with complete accuracy and therefore cannot serve at the Primary Key Foreign Key: A field (or group of fields) in one table that uniquely identifies a row of another table. IT is used to establish and enforce a link between two tables Relation: a set of data with common attributes (table) Entry-Relationship Modeling: ER diagrams consist of entities, attributes and relationships Business Rules: precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information. Business rules are derived from a description of an organization’s operations, and help to create and enforce business processes in that organization. **1. A customer may have many orders, 2. An order must have one and only one customer, 3. A distributor may have many orders. Normalization: Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance. Functional Dependencies: a means of expressing that the value of one particular attribute is associated with a specific single value of another attribute Big Data and Data Warehouses Big Data: collection of data (datasets) so large and complex that it is difficult to manage using traditional data processing approaches Structured Data: data that you can directly demonstrate in the form of tables. Unstructured Data: data that does not reside in a traditional relational database. Characteristics of Big Data: Volume, Velocity, Variety Issues with Big Data: Data Integrity, false news, incomplete, incorrect, duplicate Data Warehouse: a repository of historical data that are organized by subject to support decision makers in the organization. ** With a data warehouse, data can be more easily used Data Mart: “A low-cost, scaled-down version of a data warehouse designed for end-user needs in a strategic business unit (SBU) or an individual department.” ** A data warehouse serves the entire organization and a data mart serves one department or one SBU Knowledge Management Tacit Knowledge: •Cumulative store of subjective or experiential learning • Examples in the organizational context: organization's experiences, insights, expertise, know-how, trade secrets, skill sets, understanding, and learning • Is a form of knowledge that is unstructured and hard to codify and communicate (organization’s culture, values, present/past experiences). Explicit Knowledge: •“Knowledge that has been codified (documented) in a form that can be distributed to others.” • Objective, rational, and technical knowledge • Examples in the organizational context: the

policies, procedural guides, reports, products, strategies, goals, core competencies, and IT infrastructure of the enterprise. KMS Cycle: 1. Create Knowledge 2. Capture knowledge 3. Refine knowledge 4. Store Knowledge 5. Manage Knowledge 6. Disseminate Knowledge Telecommunications and Networks Computer Networks: PAN-Personal, LAN-Local, WAN-Wide-Are, MAN-Metro (Smallest-Largest) 3 Main Wire Communications: Fiber Optic- Fastest, most secure, Coaxial Cable – second fastest, Twisted-Pair wire – slowest. Packet Switching: the transmission technology that breaks up blocks of data into packets. -used to achieve reliable end-to-end message transmission over sometimes-unreliable networks. Client/Server Computing: Client/server computing links two or more computers in an arrangement in which some machines, called servers, provide computing services for user PCs, called clients – mail server, web server, print server (thick- local storage/programs or thin) Peer-to-Peer Processing: a type of client/server distributed processing where each computer acts as both a client and a server. Each computer can access (as assigned for security or integrity purposes) all files on all other computers. Internet: a global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents. Internet backbone: The primary network connections and telecommunications lines that link the nodes; it is made up of a fiber-optic network that is operated primarily by large telecommunications companies. Intranet vs Extranet: Intranet is private, Extranet is public. LAN is an intranet, but an intranet does not have to be a LAN IP Addresses: IPv4- 32 bits (created first), IPv6- 128 bits (created second) WWW: a system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. Not the same as internet Search Engine: a computer program that searches for specific information by keywords and then reports the results. Metasearch Engine: search several engines at once and then integrate the findings to answer users’ queries (e.g., surfwax.com; metacrawler.com) 4 Major Categories of Network Applications: Discovery, Communication, Collaboration, Educational IS Acquisition and Development Cost-Benefit Analysis: 1. Net present value, 2. Return on Investment 3. Break-even analysis 4. Business Case Approach Acquisition Methods: •(A) Purchase a prewritten application.•(B) Customize a prewritten application.•(C) Lease the application.•(D) Use application service providers and software-as-a-service vendors.•(E) Use open-source software.•(F) Use outsourcing.•(G) Employ continuous development.•(H) Employ custom development. Systems Development Life Cycle (SDLC): 1. Systems Investigation 2. Systems Analysis 3. Systems Design 4. Programming and Developing 5. Implementation 6. Operations & Maintenance – Pros: quality standards, structured process, Cons- excessive documentation, time consuming, users may be unable or unwilling to study approved specifications Different Implementations: Direct Conversion- old system cut off, Pilot Conversion- implemented in one part, assessed, implemented elsewhere, Phased Conversionimplemented in stages, Parallel Conversion- uses both systems Agile Development- rapid development and frequent user contact - Core: “do only what you have to do to be successful right now.”

4 things - privacy - accuracy - property - access 2 forces that threaten our past - Growth in IT - increased value of information and decision making Stores information horizontally and vertically - QR CODES disadvantage of telecommuting - security encryption keys are more secure than passwords PAPA - privacy - accuracy - property - access GDPR - General Data Protection Regulations BCP - business continuity planning CRO - Chief Risk Officer DBMS - Database management systems ERD - Entity Relationship Diagram ETL - extract, transform, load Data Hierarchy – bit / byte / field / record / table / data file a. bit = represents the smallest unit of data a computer can process b. byte = represents a single character (can be a letter a number or a symbol) c. field = logical grouping of characters into a word d. record = logical grouping of related fields e. data file= logical group of related records AKA data table...


Similar Free PDFs