MSIS 2103 Semester Notes
MSIS 2103 Semester Notes MSIS 2103
Popular in Computer Concepts and Applications
Popular in MSIS
This 16 page Bundle was uploaded by Malik Miller on Sunday August 21, 2016. The Bundle belongs to MSIS 2103 at Oklahoma State University taught by Fletcher Herbert Glancy III in Spring 2016. Since its upload, it has received 11 views. For similar materials see Computer Concepts and Applications in MSIS at Oklahoma State University.
Reviews for MSIS 2103 Semester Notes
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 08/21/16
MSIS Appendix A Architectural Viewpoints Model: Logical Development Process Physical Hardware Basics CPU the brains RAM the integrated circuits ; works with CPU Input Device: mouse, keyboard, scanner Output Device: monitor, printer, headphones Storage Device: DVD, hard drive Communication Device Connecting Device Software basics Operating system Utility software Application software Word processing Spreadsheet software MHz or Megahertz are the millions of CPU cycles per second GHz or Gigahertz are the billions of CPU cycles per second CISC: hardware that is multi clock loads and stores instructions high cycles per second count RISC software single clock with reduced instruction low cycles per second RAM is non-volatile so open to losing everything ROM is volatile and not easily lost memory Magnetic Mediums Magnet tapes Optical Medium: like CDs and such MSIS Appendix B Networks and telecommunications Metcalfe’s law: value of a network is Nx(N-1), network with 100,000 members as a million dollar value. Revised also to Nxlog(N) to increase a value to 2.1 million. Three types of networks: LAN (local area network), MAN (metropolitan area network), WAN (wide area network) Media strengths: fiber-optic, coaxial, then twisted pair TCP is protocol allowing integrated network telecom. MSIS Chapter 1 How do we measure data? BIT 0 or 1 Byte 8bits Kilobyte 1024 bytes-^10 bytes Megabyte 1024^2 bytes Gigabyte 1024^3 bytes Terabyte 1024^4 bytes Petabyte 1024^5 bytes Exabyte1024^6 bytes Zetabyte 1024^7 bytes Yottabyte 1024^8 bytes First-Mover Advantage normally never wins or stays. Competitors find ways to beat idea. IPhone and Kodak are examples. SWOT Analysis Five Forces Model by Michael Porter Buyer Power- how buyers affect market price o Switching cost- manipulate costs to keep customers o Loyalty Program- rewards customers for staying with business Supplier Power- supplier’s ability to influence prices they charge for supplies o Supply Chain- consist all parties involved in the procurement of a product or raw material. Threats of Substitute products or services- high when there are many alternatives to a product or service Threat new entrants- high if new competitors to enter a market. Low if barrier to enter o Entry Barrier- a feature of a product or service that customers have come to expect and entering competitors. Existing Competitors Rivalry o Product Differentiation- unique differences in products and services for distinguished good. 3 Generic Strategies MSIS Chapter 6 Business info broken down to different levels, formats, and granularities Info types: o Transactional information: encompass all within a single business to support daily operations o Analytical: Products stats, projections, growth, and trends. Real time info NOT REQUIRED for decision making Effects of low-quality information: unable to find customers and identify them, halt selling opportunities Exxon Mobile and Conoco Phili[s both use SAP systems Entity Relationship Diagram (ERD): before is just customers, invoices, line items, and products. Then the sections are divided into more specific than the tables addressed earlier. Relational Databases are more structured than otherwise. Databases that are scalable are how well a system can adapt to problems. Business Intelligence: 80% of data growth is unstructured. BI enables business user to receive data for analysis Used for answering tough questions. Such as Target story of guy finding out when girl was pregnant based on analytics. A datamart is a subset of a data warehouse. So the grouping of a particular groups data. Extraction, transformation, and loading: ETL extracts info from warehouses. Multidimensional Dimensions Analysis: o Cubes of info allow us to break down how changes in workforce can improve sales. Info cleaning and scrubbing finds the overlapping information and empty places of information to improve business processes. Analyzing big data methods o Data mining: predict, optimize, forecast, and regression models applied knowledge. Estimate and clustering to answer the questions that the company has. o Big data analytics: structured data is the defined lenth, type, and format of generated data (machine or human). Unstructured data is not defined and no specified format like freeform text such as email. o Data visualization: tools like infographics. MSIS Chapter 2 Notes Lecture: AITP Meeting on Wednesday at 5:30pm Journalism Building 101 bring clicker Section 2.1 Managerial Decision-making challenges o Large amounts info o Analysis techniques o Swift decisions Decision making problem o Identify problem o Collect data o Create solutions o Test solution o Solution selection o Solution implementation Levels of decision-making o Operational: day to day decisions that are STRUCTURED o Managerial: adapt to situations and evaluate operations SEMISTRUCTURED o Strategic: develop overall goals and strategies UNSTRUCTURED Measuring Organizational Business decisions o Project: temporary activity a company undertakes to create a unique product, service, or result. o Metrics: measurements that evaluate project effectiveness o Critical Success Factors CSF: crucial steps companies make to perform to achieve their goals and objectives and implement strategies. Ex (create good products and customer satisfaction) o Key Performance Indicators KPI: measure how CSFs are doing. Ex (turnover rates and new customers) External: portion of market that firm captures (market share) Internal: indicates the earning power of a project (return of investment ROI) Efficiency MIS Metrics: measure the performance of MIS like transaction speed and system availability. Effectiveness MIS metrics: measures the impact MIS has on business strategy. Interrelationship between efficiency and effectiveness metrics o Benchmark- baseline values the system seeks to attain o Benchmarking- process of continuously measuring system results. MIS Business decisions o Model- simplified representation or abstraction of reality Help managers with risk, uncertainty, variables, and manipulate time. Operational Support System o Transaction Process System: assists making structured decisions o Online transaction processing OLTP: capturing transaction event info o Source Document: original transaction record Managerial Support Systems o Online Analytical Processing OLAP o Decision Support System DSS What if analysis Sensitivity analysis Goal-seeking analysis Optimization analysis Strategic Support Systems o Executive Information System EIS: specialized DSS that supports senior level executives within the organization. Granularity Visualization Digital Dashboard o EISs offer Consolidation Drill-down Slice-and-dice Pivot AI to Make Business Decisions o Artificial Intelligence- simulates human intel such as the ability to reason and learn o Intel System- AI various commercial application Expert System: pc advised programs that imitate the reasoning processes of experts in solving problem Neural Network: attempts to emulate the way the brain works Fuzzy logic: math method of handling imprecise or subjective info Genetic Algorithm: AI system that mimics the evolutionary survival fittest process to generate increasingly better solutions Shopping bot: software that will search retailers for you Intelligent Agent: special purpose knowledge base info to do specific tasks for users Virtual reality: pc simulated enviro of real world or imaginary world. Managing Business Processes o Customer facing process Results in a product or service that is received by an organization’s external customer o Business facing process Invisible to the external customer but essential to the effective management of the business Business Process Modeling o Business modeling (mapping)- activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in structured sequence. o BPM Business Process Model- graphical description of a process, sequence of process tasks which develop specific As-Is process model (more steps in function) To-Be process model MIS improve business process o Workflow: includes the tasks, activities, and responsibilities required to execute each step in a business process o Types of change an organization can achieve, along with the magnitudes of change and the potential business benefit Operational Process Automation o Steps in process computerized manual tasks Managerial Process Streamlining o Streamline improve process efficiencies by simplify or eliminate unnecessary steps o Bottleneck- occur when resources reach full capacity and cannot handle any additional demands o Redundancy- task unnecessary Strategic Process Reengineering o Business process reengineering BPR- analysis and redesign of workflow within and between enterprises Learn Customer-facing and Business-facing process, as-is and to-be model MSIS Exam 3 Chapter 7 Wireless Networks o PAN Personal area network like Bluetooth o WLAN local area network Access Point like router Wireless access point Multiple in and out technology like multiple transmitters and receivers for more data o Wi-Fi means by portable devices to connect to local area network o Wireless MAN WiMax o WAN is Cellular WWAN wireless wan- wide area network that uses radio signals to transmit and receive data Smart Phone- offer offer more advanced computing ability and connectivity 3G-service that brings wireless broadband to mobile phones (third generation) Streaming-things over internet Satellite-space station that orbits the Earth receiving and transmitting signals to Earth o Wireless protections WEP-encryption algorithm designed to protect wireless transmission data War chalking- practice of tagging pavement with codes displaying where wifi access War driving- deliberately searching for Wi-Fi signals while driving by in a vehicle Manage Mobile Devices o IT consumerization o Mobile device management MDM o Mobile Application Management MAM Business Application of Wireless o Radio-Frequency ID (RFID)- electronic tags and labels to identify objects wirelessly over short distances o GPS o Geographic Info System (GIS) Chapter 8 Integration- separate systems to communicate directly with each other. o Forward integration o Backward integration o Data integration o Application integration Integration tools o Enterprise system- support and data access for a firm’s operations and business process o Middleware-software to help connect software applications o Supply Chain management, customer relationship management, enterprise resource planning- ALL the Enterprise Systems Supply chain management: flow from suppliers upstream, transformation materials into finished products, distribution products downstream to customers. o Visibility- ability to vie areas of supply chain in real time o Bull Whip affect: factors of power and influence within the supply chain. The factors include price fluctuation, order batching, shortage gaming, and inaccurate forecasts o Procurement, logistics, communication are key to supply chain success. o Technologies: 3D printing Radio frequency ID Drones Robotics CRM reports Customer Really Matter reports to keep track of likes and dislikes o RFM: Recentcy, Frequency, and Monetary Value o Entails Sales metrics, customer service metrics, and marketing metrics o Reporting technology, analysis technologies, and predicting technologies. Extended ERP components: business intel and balanced scorecard o Scorecard enables organizations to clarify vision and strategy o ERPs hard to maintain, buy, and customize but the benefits for the information are worth it. o Maintaining of ERP is slowly integrating towards the cloud Chapter 9 Systems Development life cycle SDLC o Increase or decrease revenue o Repair or damage to brand reputation o Prevent or incur liabilities o Increase or decrease productivity o Process of developing software and info systems Planning Phase: establish plan for project and its goals Analysis Phase: business requirements and refine goals into functions of the new systems Maintenance Phase Implementing phase Testing Phase o Agile versus Waterfall software development cycles o Alpha Testing, Development testing, integration testing, system testing, User Acceptance Testing(UAT), and Unit Testing o Skip of the testing step will cripple a business, example Obamacare o Implementations are parallel, plunge, pilot, and phased which are various styles for how quickly to integrate o Waterfall- sequence phases one at a time o Agile- customer satisfaction and pieced o Rapid Application Development RAD- respond to systems fast for narrow objectives (SDLC on a smaller scale) o Extreme Programming- tiny phase projects and each one complete before the next is started o Rational Unified Process (RUP)- own model to phases of development by Rational Software o SCRUM- agile with functionality at its core so nothing is broken and important pieces are solid first Service Oriented Architecture (SOA)- flexible service creations to innovate and make changes easier Project Management: o Reasons for failure- skip SDLC phases, missing requirements, DON’T MANAGE SCOPE (scope creep and feature creep) o If successful you get decreased expenses and errors while also increasing moral of workers. All requires the 6 parts of feasibility. 70% of MIS projects fail due to bad management o Project Management Institute o Triple Constraint: fail to prepare you are to fail. Time, Resource, o Diagrams: PERT chart (dependency and critical path) or Gantt MSIS Chapter 5 MIS Infrastructure: includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. o Hardware o Software o Network o Client o Server Backup and Recovery Plans: o Hot site: separate place where if one facility can be moved because mirrored o Warm site: separate place but facility copied would need to be started up. o Cold site: no mirror move (all eggs in one basket) kind of facility Business Continuity planning (BCP): a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time post disruption o Emergency: sudden event requiring immediate action o Emergency preparedness: ensures a company is ready to respond to an emergency in an organized, timely, and effective manner o Business impact analysis: identify business functions. Accessibility: refer to various levels that define what a user can access, view, or perform when operating a system. o Web accessibility: allows people with disabilities to use the web o Administrator accessibility: letting people that work in company access. Availability: time frames when the system is operational MIS and the Environment: o Moore’s Law- refers to the computer chip performance per dollar doubles every 18 months. o Sustainable or green tech: production, management, use, and disposal of tech to minimize enviro damage o Corporate social responsibility: companies’ acknowledged responsibility to society. o 3 Effects of Business with tech: Increase waste Carbon monoxide waste Fewer materials. Energy o Sustainable structure: grid computing: collection of computers to run system, Virtualization: creates multiple “virtual” machines on a single pc deivice. 85% of efficiency strength with virtualization. Example are clouds o Cloud comnputing: multi-tenancy: single place with multiple serveres. Single- tenancy: individual system, MSIS Chapter 4 Ethics Information Ethics Ethics: the principles and standards of behaviors Business Issues with info ethics: o Intellectual property o Copyright o Pirated Software o Counterfeit software o Digital rights management Ethical component of MIS o Individuals use, copy, distribute, destroy and steal information o Individuals create and spread viruses and hack into systems Acting ethically and legally are not always the same Prevention tools of info misuse o Info management, governance, compliance, secrecy, and property Ethical Computer Use Policy: general principles to guide computer user behavior by having users informed of rules and give consent to abide them Acceptable use policy (AUP): requires a user to agree to follow it to be provided access to corporate email, info systems, and the internet. Nonrepudiation: a contractual stipulation to ensure that ebusiness participants do not deny their online actions. 4.2: Downtime: period of time when system is unavailable Downtime cost to a business vary anywhere from $100 to 1 miller dollars pr/hr Virus: software written with malicious intent to cause annoyance or damage. Defense of Viruses: information security policies and plans. Data backups etc. 3 ways security technology: Authentication and Authorization (people), Prevention and Resistance (data), and Detection and Response (attack) o People: identity theft, phishing (fraud email), and Pharming (reroutes requests for legitimate websites to false websites) Chapter 3 PP Electronic Business Value Lecture: Disruptive Technologies Digital Darwinism-implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age doomed extinction. Disruptive technology- new way of doing things that initially does not meet needs existing customers. NOW defined as the tech that makes products that increase access to products and services thus, aiming to appeal to a new market not new customers Sustaining technology- produces an improved product customers eager to buy Innovator’s Dilemma- discuss how established companies can take advantage of disruptive tech without hindering customer/stakeholder relations. Disruptive tech example: Elizabeth Holmes who did the one drop blood test tech Section 3.2 Business 2.0 o Collaboration: inside/outside the organization (Wikipedia) Collaboration System: tools that support the teams, Collective intelligence: collaborating and tapping into the core knowledge of all employees Knowledge management: involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way to context effective decisions and actions. Open System: nonproprietary hardware and software based on publicly known standards that allows third parties to create add- on products to plug into or interoperate with the system. Source Code Open Source: Open Office/FireFox like programs available to all Closed Office: o Inside Organization Collaboration Explicit and Implicit knowledge o Outside organization Collaboration Crowdsourcing to gain new product ideas Crowd Funding sites such as gofundme o Sharing: content shared through open sourcing Social media: rely on user participation Social Tagging: specific keywords or phrases incorporated into website content for means of classification. Microblogging: things like twitter Real Simple syndication (RSS): like when news sends info to you Wikis: web page to do various content changes creating strong and weak relationships under the Network Effect. 6 degrees of separation: people you are distanced between. Now with social media probably about 3-4 people Mashups: website or web app that uses content from more than one source to create a completely new product or service. o Free: o Web 2.0: the next generation of Internet use- a more mature, distinctive communications platform characterized by three qualities Challenges: technology dependence, information vandalism, copyright and plagiarism o Web 3.0: based on AI web apps, semantic web describes things in a way computers understand o Egovernment: involves the use of strategies and tech to transform government Koch Industries Presentation: Jenny Adams- and Matt Wallace Market-based Management. Molex Incorporated and Koch Supply and Trading and Koch Business Solutions Rank 17 in Fortune 500 Company big 20 Opportunities in HR. Koch Internship Program with 150 or so people. Do Habitat for Humanity and Sports competitions against the new hires. Assigned a mentor for help along the way. AITP meeting 5:30 9/9, Career fair application Deadline and 9/28 on campus interviews, 9/14 Koch Day. Kochcollegerecruiting.com or Koch careers USAA Presentation Role of IT as the aorta of USAA Campus internship offers in San Antonio (HQ) and Plano Texas startup field. Ranked in IT and veteran service and F500 best companies. Look for MIS degrees and Comp Sci Generally take all backgrounds Structured 10 week paid internship, real work on projects, teambuilding projects, assigned mentor, housing and travel assistance, community service events. Job includes: optional medical, ability to earn 2 paid vacations and 3 days paid time off Application help: get an internship, get involved Go to career fair, Exxon Mobile Steven Haddick, applications Increased population will need increased energy supply Oil and Gas Company, Upstream, Downstream and Production Models Upstream- getting oil Downstream- refinery of oil and energy, research engineering, Very technology based with company support for innovation Houston: opened in 2014 where employing are co-located o Trainings and meeting for facilities o Lab for premier research o Dining and retail area o Child care development center for young kids Coding for a manufacturing robot currently IT gets to travel everywhere
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'