Show Recommended textbook solutionsBook of Proof2nd EditionRichard Hammack 340 solutions Excursions in Modern Mathematics8th EditionPeter Tannenbaum 983 solutions Book of Proof2nd EditionRichard Hammack 340 solutions A Transition to Advanced Mathematics7th EditionDouglas Smith, Maurice Eggen, Richard St. Andre 620 solutions Recommended textbook solutions
Consumer Behavior: Buying, Having, Being13th EditionMichael R Solomon 449 solutions
Politics in States and Communities15th EditionSusan A. MacManus, Thomas R. Dye 177 solutions
Consumer Behavior: Buying, Having, and Being, Global Edition12th EditionMichael R Solomon 245 solutions
Politics in States and Communities15th EditionSusan A. MacManus, Thomas R. Dye 177 solutions Ensure timely and appropriate generation, collection , dissemination, storage, and disposition of project information 1. Planning communication management: determining the information and communication needs of stakeholders (Who needs what information? When will they need it? How will the information be given to them?) 2. Managing Communications: creating
distributing, storing, retrieving, and disposing of communications based on the communications management plan 3. Controlling Communications: monitoring and controlling project communications to ensure that stakeholder communication needs are met Upgrade to remove ads Only ₩37,125/year
Units 1-8, plus Quizzes Terms in this set (188)Unit 1 1. Business Information Systems: An Overview Decimal Counting System Using 10 digits to represent quantities digital system A system consisting of only two digits, zero and one, to represent quantities. Analog System Systems based on a continuous signal that varies in strength or quantity Data Facts about people, other subjects, and events Problem Any undesirable situation Electromagnetic signals Are used for analog and digital signals Information The product of processing data so that it can be used in a particular context by human beings Data Manipulation The process of performing calculations and other data transformations related to business transactions. System An array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner. Sub-system components inside the system boundary closed system A system in which no data is allowed to enter or leave; does not interact with any other system open system Interfaces and interacts with other systems database a collection of organized data that allows access, retrieval, and use of data Information Map description of data and information flow within an organization Information Technology (IT) A term that refers to all technologies that collectively facilitate construction and maintenance of information systems. Systems thinking Basic reasoning behind equipping organizations with enterprise software applications Enterprise software applications Systems that serve many parts of the organization by minimizing the need for human data entry and ensuring timely, useful information for the organization's entire supply chain, including taking customer orders, receiving raw materials, manufacturing and shipping, and billing and collection. Document management systems provide functions to locate and retrieve such documents from various types of locations Synergy 2+2=5 rule; occurs when combined resources produce output that exceeds the sum of the outputs of the same resources employed separately. Hardware A computer and its peripheral equipment: input, output, and storage devices; hardware also includes data communication equipment Software Sets of instructions that tell the computer how to take data in, how to process it, how to display information, and how to store data and information Telecommunications People
Information systems professionals and users who analyze organizational information needs, design and construct information systems, write computer programs, operate the hardware, and maintain software Procedures Rules for achieving optimal and secure operations in data processing; procedures include priorities in dispensing software applications and security measures
Information System A computer-based set of hardware, software, and telecommunications components supported by people and procedures to process data and turn it into useful information Human-computer synergy A human-computer process that takes advantage of a computer's ability to quickly process vast amounts of data that can then be analyzed by a human Consumer privacy The handling and protection of sensitive personal information that individuals provide in the course of everyday transactions Supply Chain Management System A system that enables the coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system (ERP) Enterprise Resource Planning System An information system that supports different activities for different departments, assisting executives with planning and running the different interdependent functions Business Intelligence System A system that uses information gleaned from large amounts of data to reveal patterns, trends, and other useful information that can help improve the organization's performance Four stages of processing input: Entering data into the IS transaction A business deal or action; exchange of money, goods, or services Transaction Processing System (TPS) supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data Five basic components of the computer system 1. Input devices: Introduce data
into the IS Unit 1 Quiz ... A new company needs to automate its standard business processes. What does the company need to implement to make this happen? An information system An IT team works with a business analyst to develop a business intelligence system. This situation is a good example of _____. Human-computer synergy What is the purpose of a transaction processing system? To record data collected John, a new CIO for a business, knows that it is best if all the core business systems interface seamlessly, using a common data structure. What type of system should he purchase? An Enterprise Resource Planning System What is the core information system component for a business intelligence system? Data warehouse A business department that deals with hiring, training, and management of personnel would use which of the following systems to perform its major functions of record-keeping and employee evaluation? - The Human Resource (HR) system is responsible for employee record keeping, including employee evaluations. A business maintains large amounts of very sensitive data on its clients. What IT role is charged with planning and implementing information safekeeping measures for this type of company? Chief Security Officer What should IT professionals follow in order to ensure that the systems being developed meet high ethical standards and good practices? Codes of conduct Which of the following is an undesirable effect of new technology? Can give easy access to another person's personal information Which term refers to all of the ways that data is turned into information? Data manipulation Unit 2 1. Strategic Uses of Information Systems Porter's Five Forces Competitive rivalry; Buyer bargaining power; Threat of substitutes; Supplier bargaining power; Threat of new entrants Affiliate programs An arrangement in which a website provides sales for another website through a link to the seller's site and for which the affiliate is paid Strategic Information System Any information system that can help an organization achieve a long-term competitive advantage Late mover A company that adopts new technology after the competition has done so Early mover A company that adopts new technology before the competition does Switching costs Expenses that are incurred when a customer stops buying a product or service from one business and starts buying it from another Unit 2 Quiz ... Which of the following initiatives would enable a business to gain a competitive edge? Differentiation
of products or services A large online retailer that originally specialized in selling books online is now selling other items to its customers. What key technology for this type of business allows it to expand so
readily? Business-to-consumer system In order to become more competitive, a company has decided to reduce the price it charges for goods made. What information system
would provide the needed data to do this? Cost accounting What makes information systems strategic in nature? They enable fundamental changes to happen in a business What must a company
do with its strategic information system in order to remain competitive? Continually modify and enhance it
An existing start-up business is losing precious market share to its competitors, who have easily implemented the newest technology. What is one reason the first business cannot follow its competitors? Cost of converting from legacy systems The US has monopoly laws to prevent one company from completely dominating the market with its advanced technology. What type of issue does market domination pose? Societal A company is attempting to implement a new system by isolating the project team members, having them make all the strategic decisions while management focuses on running the business. What problem does this pose for the project? Weak executive commitment An IT
executive must determine where to use technology to help a company whose customers have become less loyal. What information system would meet this challenge? An eCommerce site to gather
customer feedback and offer discounts Obtaining a patent on items best addresses which of Porter's five
forces? Potential new entrants Unit 3 1. Business Functions Human Resource Management (HRM) system A system that houses all employee data from recruiting, hiring, evaluation, payroll, and leaving the company Enterprise Resource Planning (ERP) system An information system that supports different activities for different departments, assisting executives with planning and running different interdependent functions Customer Relationship Management A set of applications designed to gather and analyze information about customers Cash Management System An information system that helps reduce the interest and fees that organizations have to pay when borrowing money and increases the yield that organizations can receive on unused funds Computer-aided design (CAD) Special software used by engineers and designers to facilitate their work by helping with the creation, modification, and optimization of their designs Supply Chain All of the activities performed from the purchase of raw material to the shipping of manufactured goods and collection of the goods for their sale Supply Chain Management (SCM) The coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system Material Requirement Planning (MRP)
Inventory control that includes a calculation of future needs Targeted Marketing A strategy of promoting products and services to the people who are most likely to purchase them Unit 3 Quiz ... A business needs to focus on marketing more effectively to the consumers who
purchase its product. What information system would best fit this need? Customer Relationship Management Which of the following systems would most likely be used by the employees in the engineering department of a business? Computer-Aided Design, Simulation What type of information system does the distribution process in a business use to ensure on-time delivery of goods to retailers? Scheduling software In which part of a supply chain management system would a business consultant look to research substandard price labels being applied? Retailer What activity is supported by a supply chain system at the start of the supply chain? Orders from the manufacture to the supplier Which of the following activities is included in a customer relationship management system? Market research and customer service What type of marketing collects data on customers and creates specific ad campaigns to meet prospective clients' determined needs? Target What system would a salesperson use to find information about a client's inventory position and suggested purchase amounts? Customer Relationship Management (CRM) System An Enterprise Resource Planning (ERP) system collects many types of data from one system and provides it to another related system. Which of the following is a good example of this? Sales data to inventory management The
easy interface of data across the various applications in an Enterprise Resource Planning (ERP) System is why many companies purchase and implement ERP systems. What is a possible risk in doing so? ERP
packages are a significant expense to the business to implement Unit 4 1. Business Hardware Central processing unit (CPU) The circuitry of a computer microprocessor that fetches instructions and data from the primary memory and executes the instructions Internal memory The memory circuitry inside the computer that communicates directly with the CPU; consists of RAM and ROM Parallel processing The capacity for several CPUs in one computer to process different data at the same time Ergonomics The science of designing and modifying machines to better suit people's health and comfort Magnetic disk A disk or set of disks that share a spindle and are coated with an easily magnetized substance to record data in the form of tiny magnetic fields Systems software The software that executes routine tasks and includes operating systems, language translators, and communications software Object-oriented programming language A language that combines data and the procedures that process the data into a single unit called an "object," which can be invoked from different programs Groupware Any of several types of software that enable users of computers in remote locations to work together on the same project Open source software Software whose source code can be accessed by the general public Cloud computing Either an organization's or an individual's hardware or software with services provided over the Internet Unit 4 Quiz ... What computer component serves as the brains of the computer and executes all of the instructions? Central Processing Unit What does a supercomputer have that makes it so powerful? Multiple processors The banking industry developed an input device to greatly improve the processing of the millions of checks that needed to be entered. What is this device called? Magnetic-Ink Character Recognition (MICR) reader A company is being sued by several workers over repetitive motion damage in the use of their PCs. What should the purchasing agent for the company consider in the future to keep this type of legal action from occurring again? Ergonomics Application software is used to enable a user to complete specific tasks. Which of the following is considered a type of application software? Word Processor A project manager is looking to reduce the time it normally takes to develop code. What can this project manager use
to accomplish this goal? Object-oriented programming The development of applications for the internet has spawned many new
languages. Which language is associated with the generation of applets? JavaScript There are many forms of popular operating systems, some created to work on specific pieces of hardware. What makes the Linux system different
from all the others? It is open source software
Software-as-a-Service (SaaS) is a type of which category of computing? Cloud Computing What benefit does platform-as-a-service (PaaS), a form of hardware cloud computing, offer to a company? It eliminates the cost of owning and
running the company's own data center UNIT 5 1. Business Networks and Telecommunications Telecommunications Communications over a long distance, as opposed to communication within a computer or between adjacent hardware pieces Videoconferencing A telecommunications system that allows people who are in different locations to meet via transmitted images Peer-to-peer (P2P) file sharing Software applications that enable two internet users to send data to and receive data from each other; the technology is highly objectionable to organizations that sell copyrighted materials because the software promotes violation of copyrights Network A combination of a communications device and a computer or several computers, or of two or more computers, so that the various devices can send and receive text or audiovisual information to one another Virtual Private Network Hardware and software installed to ensure that a network path that includes the internet enables employees of the same organization or employees of business partners to communicate confidentially VoIP (Voice over Internet Protocol) Technologies that enable voice communication by utilizing the internet instead of a telephone network Circuit Switching A communications process in which a dedicated channel is established for the duration of a transmission; the sending node signals the receiving node and the receiver acknowledges the signal and then receives the entire message Internet Service Provider An individual or organization that provides an internet connection and sometimes other related services to subscribers UNIT 5 QUIZ ... How have advances in telecommunications helped make business in the 21st century more efficient? By providing a better distribution of data What would a business be concerned about in terms of peer-to-peer sharing, an outgrowth of telecommunications? The legal ramifications of unauthorized downloads A network manager needs to allow members of the HR team to share
data. Knowing that this is sensitive data, what type of network should the manager set up? Local Area Network A company can create more information
security by leasing lines in a network which only its authorized employees can access. What is this type of network called? Virtual Private Network (VPN) A business or an individual today needs to have access to the internet for many forms of communication and information. Which method of connection is adversely affected by an increased number of users? Cable Many people can be seen at coffee houses and bistros working away on their tablets or PCs. How are these individuals most likely connected to the internet? Over a wireless network Radio Frequency Identification (RFID) tags are being used in many business to improve the flow of goods. What do tags need in order to work correctly? A source of power Telecommuting is
now possible because of advanced telecommunications. What is one societal benefit of telecommuting? Decrease in pollution Which of the following technologies, which relies solely on a connection
to the web, might replace the current land line telephone in most consumer households? Voice over Internet Provider How do devices on the network communicate with one another to smoothly
transfer data at a high level of quality? Using TCP/IP protocol Unit 6 1. Databases and Data Warehouses Data warehouse A huge collection of historical data that can be processed to support management decision making Structured Query Language The data definition and manipulation language of choice for many developers of relational database management systems Relational operation An operation that creates a temporary table that is a subset of the original table or tables in a relational database Composite key In a data file, a combination of two fields that can serve as a unique key to locate specific records Join table In relational database manipulation, a table created by linking data from multiple tables Primary key In a file, a field that holds values that are unique to each record Relational Database Model A general structure of databases in which records are organized in tables and the relationships among tables are maintained through foreign keys Database Management System (DBMS) A computer program that allows the user to construct a database, populate it with data, and manipulate the data Data redundancy The existence of the same data in more than one place in a computer system Unit 6 Quiz ... What is the benefit of storing data in a database over a flat file structure? It reduces data redundancy John, a database administrator, tries to ensure that
each data field in the database is stored only once, eliminating data redundancy. Why is this a good practice? It improves data validity When a variety of fields are loaded together as an unit, what is
the unit called? A record What is the first step in designing a relational database? Determine the number of entities and how they relate What is a downside of using databases that have been designed to house transactional data for querying? It takes longer to retrieve the needed data What does the join
function do that is a unique relational operation? Builds temporary tables What do database managers use to develop and maintain relational databases? Structured Query Language (SQL) How do typical business analysts access the information in a data warehouse in order to do "what-if "analysis? Through data mining A data warehouse supports business analysis of problems that do not have a single solution. Which of the following is key in terms of providing information to the analyst? Large amounts of historical, pertinent data Which part of the process of building a data warehouse includes verifying the completeness of the data entered?
Loading Unit 7 1. Data, Information, and Knowledge Data Facts, or values of qualitative and quantitative variables Management by exception A style of management in which managers review only exceptions from expected results that are of a certain size or type, assuming that smaller deviations are unimportant Decision Support System (DSS) A computer-based system that uses summarized historical data to support decision making when an answer is not clear Business Intelligence Discovers not-yet-known patterns, trends, and other useful information that can help improve an organization's performance Online Analytical Processing (OLAP) A type of application that operates on data stored in databases and data warehouses to produce summary tables with multiple combinations of dimensions Knowledge Management The combination of activities involved in gathering, sharing, analyzing, and disseminating knowledge to improve an organization's performance Information Data that is put into some kind of context Unit 8 1.
Information Security Blackouts and brownouts Total or partial power loss that disrupts computer processing Unit 7 Quiz ... Which of the following types of information would be most pertinent to a company
president? Long-term time span data In order to be successful at the job, which of the following roles would most likely
require reviewing information about competitors? Marketing executive Which of the following expresses the difference between information and knowledge? Knowing what versus knowing how Which of the following would be included in managing by exception? Reviewing the worst performing items Why would a manager whose responsibility is to improve
productivity use a decision support system? To explore historical performance for possible solutions Information technology is said to enable flattening of the organization. How is this made possible? Computers
process transactional data to deliver advanced reporting Which of the following refers to a program that provides economic indices, stock and commodity pricing, and
company performance data? Executive Information System (EIS) Quinn must determine who gets access to what
information in his company. Why is an issue related to Quinn's charge? 4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those
who shouldn't have it Which of the following is considered vital to gaining a competitive advantage? Intelligence derived from
data A retail giant uses its wealth of data to enable a fiercely competitive model by
tightly controlling what aspect of its business? Value chain Social engineering Deceptive methods that hackers use to entice people to release confidential information such as access codes and passwords; often, the thieves misrepresent themselves as technicians who need one's password for fixing a problem in a network Identity theft The criminal practice of obtaining enough personal information to pretend to be the victim, usually resulting in using the victim's credit cards or issuing new credit cards under that person's name Honeytoken A bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes. When an intruder copies the database or the part of the database that contains that record, a simple program alerts security personnel, who can start an investigation Logic bomb A destructive computer program that is inactive until it is triggered by an event taking place in the computer, such as the deletion of a certain record from a file Denial of service attacks These attacks result in the inability of legitimate visitors to log on to a website because too many malicious requests are launched by an attacker Redundant Array of Independent Disks (RAID) A set of magnetic disk packs maintained for backup purposes; sometimes used for storing large databases Atomic transaction A transaction whose entry is not complete until all entries into the appropriate files have been successfully completed; it is an important data entry control Demilitarized zone A network of computers and other devices connected to the internet in which visitors are not allowed direct access to other resources Encryption The conversion of plaintext to an unreadable stream of characters, especially to prevent a party that intercepts telecommunicated messages from reading them Transport Layer Security The successor of Secure Sockets Layer (SSL); the software in the web browser responsible for secure communication Why is data security a top organizational priority? Security breaches can be a financial disaster to the company Which of the following appropriately
describes a corporate security officer's job responsibilities? Ensure the integrity and reliability of data resources What would a computer thief use keystroke logging to do? Steal information What is the goal of
phishing? Using the reputation of a trusted firm or friend to trick someone into revealing information Jill answered an email from her bank asking her to confirm her account information and personal password. What was she a victim of? Social Engineering Why would Trisha, a security officer, ask to add a duplicate non-production database to a server that is connected to the internet? To specifically detect and isolate intruders Most computer users have various antivirus programs installed. These antivirus programs control which of the following? Trojan Horses How would a computer thief hijack a computer? Install a bot What is the
role of the International Organization for Standardization (ISO)? It provides a set of standards for information security management What makes asymmetric encryption work? Use of both a pubic and private key Other sets by this creatorComprehensive Overview54 terms TaraB878 Overall Comprehension216 terms TaraB878 Final49 terms TaraB878 Pre-Final6 terms TaraB878 Verified questionsalgebra Fill in the blanks. Each real number t corresponds to a point (x, y) on the ________ ________. Verified answer algebra Use the Egyptian algorithm to find the product of $29$ and $75$. Verified answer calculus Find the critical numbers of each function. $f(x)=x^{3}-48 x$ Verified answer
pre algebra Replace each circle with the proper comparison symbol: (a) $3.0303 \bigcirc 3.303 \qquad$ (b) $0.6 \bigcirc 0.600$ Verified answer Recommended textbook solutionsNumerical Analysis9th EditionJ. Douglas Faires, Richard L. Burden 873 solutions Book of Proof2nd EditionRichard Hammack 340 solutions Topology2nd EditionJames Munkres 622 solutions Introduction to Real Analysis4th EditionDonald R. Sherbert, Robert G. Bartle 842 solutions |