Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Test 3 Cheat Sheet - Business Information Systems Concepts | INFO 209, Study notes of Information Technology

Test 3 Cheat Sheet Material Type: Notes; Professor: Ammons; Class: BUSN INFO SYSTEM CONCEPT; Subject: INFORMATION & OPERATIONS MGMT; University: Texas A&M University; Term: Spring 2011;

Typology: Study notes

2010/2011
On special offer
30 Points
Discount

Limited-time offer


Uploaded on 05/08/2011

clayton-kirk07
clayton-kirk07 🇺🇸

5

(1)

5 documents

1 / 13

Toggle sidebar
Discount

On special offer

Related documents


Partial preview of the text

Download Test 3 Cheat Sheet - Business Information Systems Concepts | INFO 209 and more Study notes Information Technology in PDF only on Docsity! A key indicator report provides a summary of critical information on a recurring schedule. Groupware refers to a class of software that enables people to work together more efficiently. Groupware is distinguished along two dimensions: 1. Whether the system support groups working together at the same time (synchronous groupware) or a different times (asynchronous groupware). 2. Whether the system supports groups working together face-to-face, or distributed. Table 8.10 Benefits of Groupware Benefits Examples Process structuring Keeps the group on track and helps it avoid costly diversions (ie doesn’t allow people to get off topic) Parallelism Enables many people to speak and listen at the same time (ie everyone has an equal opportunity to participate) Group size Enables larger groups to participate (ie brings together broader perspectives, expertise, and participation) Group memory Automatically records member ideas, comments, votes (ie allows members to focus on content of discussions, rather than on recording comments) Access to external information Can easily incorporate external electronic data and files (ie plans and proposal documents can be collected and easily distributed to all members) Spanning time and space Enables members to collaborate from different places at different times (ie reduces travel costs or allows people from remote locations to participate) Anonymity Member ideas, comments, and votes are not identified to others, if desired (ie can make it easier to discuss controversial sensitive topic without fear or identification or retribution) An Intelligent Agent, or simply agent (also called a bot—short for “software robot”), is a program that works in the background to provide some service when a specific event occurs. There are several types of agents for use in a broad range of contexts, including the following: User Agents: Agents that automatically perform a task for a user, such as automatically sending a report at the first of the month, assembling customized news or filling out a Web form with routine information. Buyer Agents (Shopping bots): A type of user agent that searches to find the best price for a particular product you wish to purchase Monitoring and Sensing Agents: Agents that keep track of key information such as inventory levels or competitors’ prices, notifying the user when conditions change. Data-Mining Agents: Agents that continuously analyze large data warehouses to detect changes deemed important by a user, sending a notification when such changes occur. Web crawlers: Agents that continuously browse the web for specific information (eg used by search engines) – also known as Web spiders Destructive Agents: Malicious agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines. Table 8.12 Benefits and Challenges of Knowledge Management Sys Benefits Challenges Enhanced innovation and creativity Getting employee buy-in Improved customer service, shorter product Focusing too much on technology Enhanced employee retention Forgetting the goal Improved organizational performance Dealing with knowledge overload and obsolescence A knowledge management system is typically not a single technology but rather a collection of technology-based tools that include communication technologies—such as email, groupware, instant messaging, and the like—as well as information storage and retrieval systems, such as a database management system, to enable the generation, storage, sharing, and management of tacit and explicit knowledge assets. CH. 9 BUILDING ORGANIZATIONAL PARTNERSHIPS USING ENTERPRISE INFORMATION SYSTEMS All the following are true about legacy systems: They are stand-alone systems They are older software systems They may be difficult to integrate Software programs come in two forms—packaged and custom. Packaged applications are software programs written by third-party vendors for the needs of many different users and organizations, whereas custom applications are software programs that are designed and developed exclusively for a specific organization. The features and modules that an enterprise system comes with out of the box are referred to as the vanilla version. If the vanilla version does not support a certain business process, the company may require a customized version. Customization either provides additional software that is integrated with the enterprise system or direct changes to the vanilla application itself. Reprogramming might be necessary when a new release of the system is implemented. Most enterprise systems are designed to operate according to industry- standard business processes, or best practices. Most enterprise system vendors build best practices into their applications to provide guidelines for management to identify business activities within their organizations that need to be streamlined. Implementations and future upgrades to the system will go more smoothly. Supply Chain Planning involves the development of various resource plans to support the efficient and effective production of goods and services. Demand Planning and Forecasting- SCP beings with product demand planning and forecasting. Supply chain management modules examine historical data to develop the most accurate forecasts possible. Leads to demand forecast. Distribution Planning- Once final product planning forecasts are complete, plans for moving products to distributors can be developed. Distribution planning focuses on delivering products or services to consumers as well as the warehousing, delivering, invoicing, and payment collection. Leads to transportation schedule. Production Scheduling- focuses on the coordination of all activities needed to create the product or service. Analytical tools are used to optimally utilize materials, equipment, and labor. Also involves product testing, packaging, and delivery preparation. Leads to the production plan. Procurement Planning- Procurement planning focuses on the development of inventory estimates using inventory simulations and other analytical techniques. Suppliers are then chosen. Inventory stimulation is a key element of the procurement planning process. FIGURE 9.23 A supply chain strategy requires balancing supply chain efficiency and effectiveness. Supply Chain Strategy Procurement Production Transportation Effectiveness   Efficiency More inventory Multiple Inventory Systems   Single Inventory Source Less inventory General Purpose Facilities More Facilities Higher Excess Capacity   Less Excess Capacity Fewer Facilities Special Purpose Facilities Fast Delivery Times More Warehouses   Fewer Warehouses Longer delivery times A comprehensive customer relationship management system includes all of the following: Operational CRM, Analytical CRM, and Collaborative CRM. CH. 10 DEVELOPING AND ACQUIRING INFORMATION SYSTEMS As with adaptive maintenance, both perfective maintenance and preventive maintenance are typically a much lower priority that corrective maintenance, which deals with repairing flaws in the system. Corrective maintenance is most likely to occur after initial system installation, as well as over the life of a system after major system changes. This means that adaptive, perfective, and preventive maintenance activities can lead to corrective maintenance activities if they are not carefully designed and implemented. Types of software maintenance Maintenance Type Description Corrective Maintenance Making changes to an information system to repair flaws in the design, coding, or implementation Adaptive Maintenance Making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment Perfective Maintenance Making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required system features, (in other words “bells” & “whistles”) Preventive Maintenance Making changes to a system to reduce the chance of future system failure Outsourcing systems development is a way to acquire new information systems that closely resembles the process of in-house development. In the case of outsourcing, the responsibility for some or all of an organization’s information systems development (and potentially management) is turned over to an outside firm. All of the following are types of outsourcing: basic, strategic, and preferred. Elite is not a type of outsourcing. A basic relationship can best be thought of as a “cash-and-carry” relationship in which you buy products and services on the basis of price and convenience. Preferred relationships are when the buyer and supplier set preferences and prices to the benefit of each other. Strategic relationships happen when both sides share risks and rewards. All of the following factors are a good reason to outsource: problems in IS performance, supplier pressures, financial factors. System conversion happens in one of four ways: parallel, direct, phased, pilot (single location) Parallel- old and new systems are used at the same time. Direct- old system is discontinued on one day, and the new is used on the next day. Phased- Parts of the new system are implemented over time. Pilot (single location)- Entire system is used in one location. CH. 11 MANAGING INFOMATION SYSTEMS ETHICS AND CRIME Information accessibility focuses on defining what information a person or organization has the right to obtain about others and how this information can be accessed and used. Information privacy is concerned with what information an individual should have to reveal to others in the workplace or though other transactions, such as online shopping. Information accuracy is concerned with ensuring that authenticity and fidelity of information as well as with identifying who is responsible for information errors that harm people. Information property focuses on who owns information about individuals and how information can be sold and exchanged. In the U.S., two main federal laws have been passed against computer crime, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. The following copyright laws are applicable to illegal software piracy: the 1980 Computer Software Copyright Act, a 1992 act that made software piracy a felony, the 1997 no electronic theft (NET) Act that made copyright infringement a criminal act even when no profit was involved. The Computer Fraud and Abuse Act prohibits stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information. Gaining authorized access to computers owned by any agency or department of the U.S. government. Violating data belonging to banks or other financial institutions. Intercepting or otherwise intruding on communications between states or foreign countries. Threatening to damage computer systems in order to extort money or other valuables from persons, businesses or institutions. The Electronic Communications Privacy Act makes it a crime to break into any electronic communications service, including telephone services. It prohibits the interception of any type of electronic communications. Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called crackers. Crimes committed against telephone company computers with the goal of making free long-distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpetrator’s choice, or otherwise disrupting telephone service for subscribers is called phreaking. Computer crime is defined as the act of using a computer to commit an illegal act. This broad definition of computer crime can include the following: 1. Targeting a computer while committing an offense. For example, someone gains unauthorized entry to a computer system in order to cause damage to the computer system or to the data it contains. 2. Using a computer to commit an offense. In such cases, computer users may steal credit card numbers from Web sites or a company’s database, skim money from bank accounts, or make unauthorized electronic fund transfers from financial institutions. 3. Using computers to support a criminal activity, despite the fact that computers are not actually targeted. For example, drug dealers and other professional criminals may use computers to store records of their illegal transactions. Type of crime Description Carding Stealing credit card information for one’s own use or to sell Cloning Using scanners to steal wireless transmitter codes for cell phones, then duplicating the phone for illegal use. Data diddling Changing electronic data before or after it is entered on computers Dumpster diving Scouring wastebaskets and dumpsters for credit card receipts and other information, then using the information illegally or selling it. Phishing or spoofing Attempting to trick financial account and credit card holders into giving away their authorization information, usually by posting false Web sites that duplicate legitimate sites. Phreaking Breaking into telephone systems to make free long- distance calls or for other purposes. Piggybacking or shoulder surfing Looking over a person’s shoulder while he or she is using an automated teller machine, cell phone, or other device in order to steal access information. Salami slicing Stealing small amounts of money from a large number of financial accounts Social engineering or masquerading Misrepresenting yourself in order to steal equipment or to trick others into revealing sensitive information. Vishing Also known as voice phishing; instead of asking users to visit a Web site, asking users to call a fake telephone number and “confirm” their account information. Cyber war refers to an organized attempt by a country’s military to disrupt or destroy the information and communication system of another country. Cyber terrorism is launched, not by governments, but by individuals and organized groups. Cyber terrorism is the use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals. CPS QUESTIONS The Access starter file database consists of ____ tables. five The Access assignment require the creation of _____ queries ten The Access assignment requires the creation of ____ data entry forms. no The Access assignment requires the creation and printing of _____ report(s) one Which of the following constructs would be used to cause the field 'Name' to be displayed in query results as 'Customer'? Customer : Name Which of the following constructs would be used to concatenate the fields 'First' and 'Last' separated by a space in query results labeled 'Name'? Name: [First] & " " & [Last] What criterion would be used in the query design grid for field 'Last Name' to only display only those individuals with last names starting with P? Like "P*" You wish to create a calculated field labeled 'Profit' that shows the difference between numeric fields 'Revenues' and 'Expenses'. Which would do that? Profit : [Revenues] - [Expenses] What criterion would you enter for the currency field 'Fringe Benefits' to filter only those records whose value is $10,000 or less? <= 10000 If multiple fields in a query are used to sort fields, the sort order is executed ___________ A by use of a SortField criterion B by use of a SortKey criterion C by use of a SortSequence criterion D by use of a SortOrder criterion E none of the above correctly complete the sentence In a query, to divide records based on the values in a specified field, you would use the _____ operator GroupBy Which of the following functions is NOT available as an aggregate function in Access? highest value lowest value mean value (average) most often occurring value (mode) sum of values When executing a query, all fields _____ be displayed in the query results. used in the design grid need not Access reports can display data directly from ____ A one table B two or more related tables C a query involving one table D a query involving two or more related tables E all four of the above correctly complete the sentence Which of the following will be accepted as valid during data entry using Access? entering numbers into a field of datatype 'Text' Which Access table fields are commonly defined with an input mask? social security number, zip code Which Access table field properties would you use to limit data entry to 5 characters and ensure that an entry is made? field size and required Which of the following will always print on each and every page of a mulit- page, grouped Access report? detail line While in Access table datasheet view, a temporary sub-set of selected records can be created by defining a ______. Report /Query Description Scheduled reports Reports produced at predefined intervals – daily, weekly, or monthly—to support routine decisions Key indicator reports Reports that provide a summary of critical information on a recurring schedule Exception reports Reports that highlight situations that are out of the normal range Drill-down reports Reports providing greater detail as to why a key indicator is not at an appropriate level or an exception occurred Ad hoc queries Queries answering unplanned information requests to support a nonroutine decision; typically not saved to be rub again. filter During Access table design, fields upon which their values may have mathematical calculations performed cannot be of datatype ________ date/time A ___ report highlights situations that are out of the normal range. exception Which of the following is NOT a benefit of groupware? group memory openness access to external information parallelism Which of the following is NOT type of intelligent agent system? monitoring and sensing agent shipping bot user agents destructive agents Which of the following is NOT a way information can be entered or processed in a TPS? fully automated data entry manual data entry off-line processing batch processing ___decisions are typically made when some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made. semi-structured Which of the following is a commonly used GIS application? customer dot mapping Which of the following is NOT a benefit of Knowledge Management Systems? improved organizational performance, enhanced employee retention, enhanced innovation and creativity, getting employee buy-in Which of the following is NOT a type of AI? intelligent agent system, decision support system, expert system, neural network Which of the following is NOT a ERP support activity? Procurement, administrative, customer service, infrastructure Systems that focus on the specific needs of the individual departments and are not designed to communicate with other systems are known as ___ systems. stand-alone Which of the following is NOT one of the general types of plans developed with the SCP process? sales planning and forecasting Which of the following was NOT listed as one of the benefits of a CRM system? improved communication Which of the following is NOT one of the enterprise wide changes that must be included in a successful CRM strategy? marketing plan changes Which of the following was NOT listed as one of the challenges in implementing enterprise systems? secure executive sponsorship, get help from outside experts, thoroughly train administrators, look beyond the company's immediate needs Which of the following would NOT improve SCM efficiency? fewer warehouses, less inventor, faster delivery times, fewer facilities Systems for providing efficient and effective communication with the customer from the entire organization are referred to as _____ CRM. Collaborative ______ maintenance involves making changes to a system to reduce the chance of future system failure. preventive _____ is NOT a type of outsourcing relationship. Basic, special, preferred, strategic Which of the following was NOT listed as a good reason to outsource some (or all) of a firm's IS services? financial factors, regulatory factors, organizational culture, supplier pressures Which of the following is not one of the 5 general steps most competitive external acquisition processes follow? system acquisition When a software system is converted in a branch office BEFORE being implemented company-wide, the company is using a _____ conversion plan. pilot Which of the following was NOT listed as a benefit of end-user application development? long development time, reduces cost of labor, ensures continuity, avoids IS developer work overload Developing database tables and their relationships would occur during the systems _____ phase of the SDLC. design Information _____ is concerned about what information a person or organization has the right to obtain about others. accessibility The ____ prohibits the dissemination of computer viruses and other harmful code. Computer Fraud and Abuse Act _____ break into computer systems to promote political or ideological goals such as free speech, human rights, and antiwar campaigns. hacktivists Attempting to get financial account information by using a false web site that duplicates a legitimate one is called ________. spoofing ____ are most often spread through malicious e-mail attachments or file downloads, can reproduce themselves, and, sometimes, are intended to be harmless pranks. viruses Cyberterrorism attacks might take all but which of the following forms? electronically blinding friend-or-foe identification systems Governments accused of having conducted cyberwar deny direct involvement and, in turn, blame ______. cyberterrorists ACCESS TOPICS Datatypes Description Text Any field that does not fit criteria for one of the other data types. This includes not only text, but also formatted numbers like ZIP codes and phone numbers. May have input mask property value. Number Quantities; values that will have mathematical calculations performed on them. Choose from seven number formats. Date/Time Dates and times. Choose from seven date and time formats. Although you can enter dates and times as text data types, you must use the date/time data type if you want to sort the values. May have input mask property value. Currency Money amounts. Choose from five number and two currency (dollar and Euro) formats. You can perform mathematical calculations on currency values. YOU VIEW RESULTS IN DATASHEET VIEW AND YOU EDIT IN DESIGN VIEW When the “Show” box is checked the information in the column will show. The label of the query in datasheet view appears as “Client Name” at the head of the column. In design view, “Client Name: (information goes here)” is how it appears. See above for example. The criteria selected are all the last names that begin with the letter “J”. The total is what the information will be grouped by. For example, whether you want the total to be the total number of entries (Count) OR the average of the numbers (Avg). You can sort your information by descending and ascending order from the drop down menu. How to concantenate by “LastName, FirstName”: Client Name: [pfaClientLastName]&”,”&[pfaClientFirstName] To sort on a report click group and sort and then determine which components to group by. REPORT INFORMATION TABLE INFORMATION The screen shot below shows decriptions and their use in acccess tables.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved