INFS 3000 Review Final Exam – Summer 2015 Study Guide
INFS 3000 Review Final Exam – Summer 2015 Study Guide Infs 3000
Popular in Intro to Management Information Systems
Popular in Business Administration
This 7 page Study Guide was uploaded by Dominique LaSalle on Tuesday June 7, 2016. The Study Guide belongs to Infs 3000 at University of Colorado Colorado Springs taught by William ayen in Spring 2016. Since its upload, it has received 83 views. For similar materials see Intro to Management Information Systems in Business Administration at University of Colorado Colorado Springs.
Reviews for INFS 3000 Review Final Exam – Summer 2015 Study Guide
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 06/07/16
INFS 3000 Review Final Exam – Summer 2015 All questions on the exam will be linked to the Learning Objectives listed at the beginning of the PowerPoint slides for each unit. Chapters 3, 4, 5, 6.2, 7, 8 Chapter 3 What is the difference between Podcasting, Videoconferencing, and Web conferencing? - Podcasting: the conversion of an audio broadcast into a digital music player. - Videoconferencing: allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. - Web conferencing: blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. What does a content management system do? - A content management system helps companies manage the creation, storage, editing, and publication of their website content. They are user-friendly and most include web- based publishing, search, navigation, and indexing to organize information. Users with little to no technical expertise are able to make website changes. What is the difference between Web 1.0, 2.0 and 3.0 - Web 1.0 refers to the World Wide Web during its first few years of operation between 1991 and 2003. - Web 2.0 is the next generation of Internet use- a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing and free. - Web 3.0 is based on intelligent web applications using natural language processing, machine-based learning and reasoning, and intelligent applications. It is the next step in the evolution of the Internet and web applications. 4 e-business models – B2B, B2C, C2B, C2C – understand an example of each - B2B (business to business): applies to businesses buying and selling to each other over the internet o Ex. Medical billing service, software sales and licensing. B2B represents 80% of all online business - B2C (business to consumer): applies to any business that sells its products or services directly to consumers online o Ex. Carfax - C2B (consumer to business): applies to any consumer who sells a product or service to a business on the internet o Customers of Priceline.com, a website where customers set their own prices for items like airline tickets or hotel rooms and wait for a seller to supply them - C2C (consumer to consumer): applies to customers offering goods and services to each other on the internet o Ex. Auctions where buyers and sellers solicit consecutive bids. Craigslist and eBay. Disintermediation, Reintermediation - Disintermediation: when a business sells directly to the customer online and cuts out the intermediary - Reintermediation: steps are added to the value chain as new players find ways to add value to the business process What is Search Engine Optimization (SEO) and why is it important for a web based sales organization SEO combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. The better the SEO, the higher the ranking for a website in the list of search engine results. SEO is critical because most people only view the first few pages of a search result. Chapter 4 Ethics and Information Security Authorization versus authentication – what is the difference, what are the three types of authentication? - Authorization: the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space. - Authentication: is a method for confirming users’ identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. o 3 types of authentication: tokens, smart card, biometrics o Each falls into 3 categories: Something user knows, such as a user ID and password Something the user has, such as a smart card or token Something that is part of the user, such as a fingerprint or voice signature Ethical computer use policy and acceptable computer use policy – know what these are - Ethical computer use policy contains general principles to guide computer user behavior. Ensures that users know how to behave at work and the organization has a public standard to deal with infractions. - Acceptable computer use policy: requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Computer Monitoring technologies – know what some of these are First line and second line of defense – what are they - First line of defense: people - Second line of defense: technology Chapter 5 – Infrastructures: Sustainable Technologies Be able to describe these (briefly), know the sub components of and discern the difference between them: 1) Information infrastructure: identifies where and how important information, such as customer records, is maintained and secured a. Backup and recovery plan: an exact copy of a system’s information; the ability to get a system up and running in the event of a system crash or failure i. Fault tolerance ii. Failover iii. Failback b. Disaster recovery plan: a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood c. Business continuity plan: a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption 2) Agile infrastructure: includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals a. Accessibility: refers to the varying levels that define what a user can access, view, or perform when operating a system b. Availability: time frames when the system is operational c. Maintainability: how quickly a system can transform to support environmental changes d. Portability: the ability of an application to operate on different devices or software platforms e. Reliability: ensures a system is functioning correctly and providing accurate information f. Scalability: how well a system can scale up, or adapt to the increased demands of growth g. Usability: the degree to which a system is easy to learn and efficient and satisfying to use 3) Sustainable infrastructure: identifies ways that a company can grow in terms of computing resources simultaneously becoming less dependent on hardware and energy consumption Be able to describe each of the following sustainable trends: Cloud Computing: a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction Virtualization: creates multiple “virtual” machines on a single computing device Grid Computing: a collection of computers, often geographically dispersed, that are coordinated to solve a common problem What is disaster recovery? Why do organizations have to plan for this? - Disaster recovery is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood Definitions: Interoperability Scalability: how well a system can scale up, or adapt to the increased demands of growth Failover: a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server Chapter 6.2 Data Warehouses and Business Intelligence Data Rich, Information Poor Drill down o Enables users to view details, and details of details, of information Data Mining – what is Data Mining o The process of analyzing data to extract information not offered by the raw data alone Data mining tools – what they do o Use a variety of techniques to find patterns and relationships in large volumes of information Classification, estimation, affinity grouping, clustering ETL – what is it, why is it needed o ETL is extraction, transformation, and loading and it is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse. Information cleansing o A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information OLAP tools – what are they, why used What is scalability in an Information System? Why is it important? Multidimensionality o Databases contain information in a series of two-dimensional tables o In a data warehouse and data mart, information is multidimensional, it contains layers of columns and rows Dimension- a particular attribute of information Cube- common term for the representation of multidimensional information What is a Data Mart? o Contains a subset of data warehouse information Cluster analysis – how used, what information about customers can be determined o A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible Association analysis - how used, what information about customers can be determined o Reveals the relationship between variables along with the nature and frequency of the relationships Statistical analysis - how used, what information about customers can be determined o Performs such functions as information correlations, distributions, calculations and variance analysis Forecast: predictions made on the basis of time-series information Time-series information: time-stamped information collected at a particular frequency Chapter 7 Networks and Mobile Computing Definition for a computer network Local Area Network (LAN): connects a group of computers in close proximity, such as in an office building, school, or home Personal Area Network (PAN): provides communication for devices owned by a single user that work over a short distance Wi-Fi: a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves VAN – Value Added Network VPN: Virtual Private Network: when companies establish direct private network links among themselves or create private, secure Internet access. RFID – what is it, how does it work? - Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code. RFID wirelessly exchanges information between a tagged object and reader/writer. Client/Server vs Peer-Peer: - Peer-to-Peer: is a computer network that relies on the computing power and bandwidth of the participants in the network rather than centralized server. - Client/Server: model for applications in which the bulk of the back-end processing takes place on a server, while the front-end processing is handled by the clients VoIP: Voice over IP uses IP technology to transmit telephone calls. Packet switching Fault tolerance – what is it, why do we need it? - Resistance to crashing; we need it to keep the data Description of how a Bus (CSMA/CD) network works Chapter 8 Enterprise Resource Planning (ERP), Customer Resource Planning (CRM) Basic definition of ERP – how the systems work, where the data comes from o ERP, or enterprise resource planning, integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprisewide decisions by viewing enterprisewide information on all business operations Know what the Core (common) and Extended components of ERP are and WHAT they do o Core ERP component: traditional components included in most ERP systems and they primarily focus on internal operations o Extended ERP component: extra components that meet the organizational needs not covered by the core components and primarily focus on external operations Single point of access to data for all users, as in an ERP system – what are the advantages Development strategies, Customization Understand the implementation issues that can occur in an organization Technical and Cultural Measuring success in an ERP system – Balanced Scorecard approach o A balanced scorecard approach enables organizations to clarify their vision and strategy and translate them into action. o Balanced scorecard views the organization from four perspectives: Leaning and growth: “to achieve our vision, how will we sustain our ability to change and improve?” Internal business process: “To satisfy our shareholders and customers, what business processes must we excel at?” Customer: “To achive our vision, how should we appear to our customers?” Financial: “To succeed financially, how should we appear to our shareholders?” Operational (front office) versus Analytical (back office) o Operation CRM: supports traditional transactional processing for day to day front office operations or systems that deal directly with customers o Analytical CRM: supports back office operations and strategic analysis and includes all systems that do not deal directly with the customers Reporting, Analyzing and Predicting technologies o CRM reporting technology: help organizations identify their customers across other applications o CRM analysis technologies: help organization segment their customers into categories such as best and worst customers o CRM predicting technologies: help organizations make predictions regarding customer behavior such as which customers are at risk of leaving Answers these type of questions respectively What happened, Why it happened, What will happen in the future Know how R, F and M analysis can be done with a CRM o R: recency; how recently a customer purchased items o F: frequency: how frequently a customer purchased items o M: monetary: the monetary value of each customer purchase Personalization o Website personalization occurs when a website has stored enough data about a person’s likes and dislikes to fashion offers more likely to appeal to that person 60% Multiple choice T/F/Fill in the blank 40% Describe, discuss, short essay
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'