MSIS Final- study notes PDF

Title MSIS Final- study notes
Course Introduction to Computers and Information Systems
Institution University of Massachusetts Boston
Pages 6
File Size 150.9 KB
File Type PDF
Total Downloads 26
Total Views 148

Summary

final cheat sheet
...


Description

Information Technology - Data - Raw facts that describe the characteristics of an event. E.G. order date, amount sold, customer # Information - Data converted into a meaningful and useful context. E.G best customer, worst selling product Business Technology - Information collected from multiple sources that analyzes patterns, trends and relationships for strategic decision making. E.G. lowest sales per week compared w/ the economic interests rate Knowledge - the skills, experience, and expertise coupled with information and intelligence that create a person's intellectual resources. E.G. choosing not to fire an employee who is underperforming knowing that person is experiencing family problems. Porter’s Five Forces Model - analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry. -Its purpose is to combat these competitive forces by identifying opportunities, competitive advantages, and competitive intelligence. If the forces are strong, they increase competition; if the forces are weak, they decrease competition.Buyer power, supplier power, threat of substitute products or services, threat of new entrants, rivalry among existing competitors. Porter’s 3 Generic Strategies - Cost Leadership - Superior Profits through lower costs. Low costs; broad market. Walmart. Differentiation- Creating a product or service that is perceived as being unique. High costs; broad market. Neiman Marcus. Focus Strategy - concentrating on a limited part of a market. Low+ high costs; narrow market. Payless, Tifany&Co Disruptive v. Sustaining - A disruptive technology is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technologies tend to open new markets and destroy old ones. A sustaining technology, on the other hand, produces an improved product customers are eager to buy, such as a faster car or larger hard drive. Sustaining technologies tend to provide us with better, faster, and cheaper products in established markets.The internet and WWW caused business disruption by allowing businesses to to communicate with anyone, anywhere, at anytime, creating a new way to participate in

business, causing the Web 1.0 internet boom.Ebusiness created a paradigm shift, transforming the entire industry and rewrote traditional business rules. Web 1.0- Ecommerce – Buying and selling of goods and services over the Internet. E-business – Includes ecommerce along with all activities related to internal and external business operations. E-business AdvantagesExpanding global reach. Opening new markets. Reducing costs. Improving operations and effectiveness. Web 2.0- characterized by 3 qualities. Collaboration, sharing and free. Encourages user participation and the formation of communities that contribute to the content. Content sharing through open sourcing, User contributed content. Collaboration inside the organization. Collaboration outside the organization. Business 2.0 tools for collaborating Blogs- an online journal that allows users to post their own comments, videos. Wikiscollaborative website that allows users to add, remove and change content. Mashups- content from more than one source to create a new product or service. Ethical issues in the use of information technology - 1. Privacy- the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. A. The protection of customers’ privacy is one of the largest, and murkiest, ethical issues facing organizations today. B. Our privacy can be exploited through webcams where experience computers users can turn on any webcam of any computer online and have access to our private lives. C. Common monitoring technologies include : Keylogger, Cookies, Adware, Spyware, Clickstream 2. Individuals creating and spreading viruses that cause trouble for those using and maintaining IT systems.3. Copyright Infringement - Individuals hacking into computer systems to steal proprietary information. - Employees destroying or stealing proprietary organization information such as schematics, sketches, customer lists, and reports. Hackers v. Viruses - Hackers- Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.E.G:black-hat hacker, cracker, cyberterrorist, Hacktivist. Viruses- Software written with malicious intent to cause annoyance or damage E.G. Worm,Trojan-horse virus,Backdoor program,DoS. Authentication & Authorization- Authentication – A method for confirming

users’ identities. Authorization – The process of giving someone permission to do or have something including access levels and abilities such as file access, hours of access, and amount of allocated storage space. -Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user. -Authentication and authorization techniques:Something the user knows, such as a user ID and password.Something the user has, such as a smart card or token.Something that is part of the user, such as a fingerprint or voice signature. --Single-factor authentication is the traditional security process, which requires a username and password. Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token). Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).Primary vs secondary storage :Primary storage is the computer’s main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU. -Random access memory (RAM) is the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus.-Cache memory is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.-Read-only memory (ROM) is the portion of a computer’s primary storage that does not lose its contents when one switches off the power. ROM contains essential system programs that neither the user nor the computer can erase. Secondary storage consists of equipment designed to store large volumes of data for long-term storage. Secondary storage devices are nonvolatile and do not lose their contents when the computer is turned off.-Storage capacity is expressed in bytes. megabyte 1 million bytes. Gigabyte 1b. terabyte 1T. MIS infrastructure includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets.- A solid MIS infrastructure can reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability.-MIS is the foundation supporting all of

these systems that enable business growth, operations, and profits.- It supports the volume and complexity of today’s user and application requirements.It protects systems from failures and crashes. Information MIS infrastructure- supports operation. :Backup, recovery, business continuity planning. Agile MIS infrastructure- supports change: accessibility, availability, maintainability, portability, reliability, scalability, usability. Sustainable MIS infrastructuresupports sustainability: grid computing, cloud computing, virtualization. Cloud computing - is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.- Cloud computing offers new ways to store, access, process, and analyze information and connect people and resources from any location in the world where an Internet connection is available.-You also don’t have to worry about scalability because the system automatically handles peak loads, which can be spread out among the systems in the cloud. Why is it important: makes it easier to gain access to the computing power that was once reserved for large corporations. Small to medium-size companies no longer have to make big capital investments to access the same powerful systems that large companies run. Combats ewaste, energy consumption, and carbon emissions. Advantages: accessibility, cost saving, flexibility, reliability, portability, backup/recovery, scalability, availability. Disadvantages: Security – If hacked, or company goes out of business, then who knows what happens. – Reliant on the Internet. – Limited by the features they give you. Environmental impacts associated w/ MIS- Increased electronic waste energy consumption and carbon emissions.Database- maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses). A database management system (DBMS) creates, reads, updates, and deletes data in a database while controlling access and security The systems development life cycle (SDLC) is the overall process for developing information systems, from planning and analysis through implementation and maintenance.The SDLC

begins with a business need, proceeds to an assessment of the functions a system must have to satisfy the need, and ends when the benefits of the system no longer outweigh its maintenance costs. The SDLC is comprised of seven distinct phases: planning, analysis, design, development, testing, implementation, and maintenance. A data warehouse is a logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks. The primary purpose of a data warehouse is to combine strategic information, throughout an organization into a single repository in such a way that the people who need that information can make decisions and undertake business analysis. DW a tool that managers, to be more effective in many ways, including:Developing customer profiles. Identifying new-product opportunities.Improving business operations.Identifying financial issues.Analyzing trends. Understanding competitors. Network Types A PAN, is a computer network organized around an individual person within a single building. small office or residence. includes 1 or more computers, telephones, A LAN, consists of a computer network at a single site, individual office building. very useful for sharing resources, such as data storage and printers. MAN, consists of a computer network across an entire city, college campus or small region. A WAN, occupies a very large area, such as an entire country or the entire world. Project management -is the application of knowledge skills tools and techniques to project activities to meet project requirements. All projects are limited in some way by these three constraints; time , cost and scope. The Project Management Institute calls the framework for evaluating these competing demands the triple constraint.The relationship among these variables is such that if anyone changes, at least one other is likely to be affected.For example, moving up a project’s finish date could mean either increasing costs to hire more staff or decreasing the scope to eliminate features or functions. Increasing a project’s scope to include additional customer requests could extend the project’s time to completion or increase the project’s cost—or both—to accommodate the changes. Project quality is affected by the project manager’s ability to balance these competing demands. High-quality projects deliver the agreed

upon product or service on time and on budget. Project management is the science of making intelligent trade-offs between time, cost, and scope. Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. Increased quality and efficiency of business processes.Benefits: Reduced operating expenses for head count and exposure to risk for large capital investments. Page 27/4 Access to outsourcing service provider’s expertise, economies of scale, best practices, and advanced technologies. Increased flexibility for faster response to market changes and less time to market for new products or services. Challenges: Length of contract. Most companies look at outsourcing as a long-term solution with a time period of several years. Training and transferring resources around the globe is difficult and expensive, hence most companies pursuing offshore outsourcing contract for multiple years of service. A few of the challenges facing the length of the contract include: It can be difficult to break the contract, Forecasting business needs for the next several years is challenging and the contract might not meet future business needs, Re-creating an internal MIS department if the outsource provider fails is costly and challenging.-Threat to competitive advantage. Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company’s trade secrets. -Loss of confidentiality. Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.

Msis 101 final Cheat sheet Pass A 100...


Similar Free PDFs