IS Exam Study Guide

pdf

School

University of Utah *

*We aren’t endorsed by this school

Course

4410

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

2

Uploaded by ChancellorBoulder12740

Report
Why is MIS the most important class in the business school? (Ch 1) - Key Elements: management + use, information systems, strategies - Goal: managing IS to achieve business strategies - Job Security (requires skills and ability to adapt, favors people w/ strong non-routine cognitive skills) - Message: develop strong non-routine cognitive skills (abstract reasoning, systems thinking, collab, ability to experiment) - Digital Revolution - Information age: production distribution, control of information is the primary driver of the economy - Digital Revolution: the conversion from mechanical/analog devices to digital devices - Future business professionals must be able to assess, evaluate, and apply emerging information technology to business Componenents of IS (hardware, software, data, procedures, people) - Hardware: computer side, actors | Software: computer side, instructions | Data: bridge | Procedures: human side, instructions | People: human side, actors - Automation moves work from human to computer | increasing difficulty of change - most important component is YOU | cognitive skills determine quality of thinking, ability to conceive info from data - IT vs IS - IT: products, methods, inventions, and standards used for producing info (can buy) - IS: assembly of hardware, software, data, procedures, and people that produce info (cannot buy) - Data : recorded facts and/or figured - Accurate, timely, relevant, barely sufficient worth its cost - Information : processed (by summing, ordering, averaging, comparing, etc.) data to provide value to its users - Non-routine vs routine skills - Non-routine: collaboration, abstract thinking, systems thinking, ability to experiment Industry Structure (Ch. 2) - IS exists to support businesses achieve strategies, competitive strategy then determines organizational goals/objectives, strat determines value chains (business processes), business processes determine design of IS, strategy determines IS - Organizational Strategy : industry structure, competitive strategy, value chain, business processes, information systems - Porter Five Forces: - Competitive forces: threat of substitutions, threat of new entrants, rivalry - Bargaining Power forces: bargaining power of suppliers, bargaining power of customers - Industry wide: lowest cost across industry (cost), better product/service across (differentiation) - Focus: lowest cost within an industry segment (cost), better product/service within an industry segment (differentiation) - Competitive Strategy + Value Chain - business select a cost-leader strategy would structure around low cost processes, business that select differentiation strat structure around costly process and add value - Value: what customer willing to pay | Difference between value and cost = margin - VC: value creating activities = primary (creating, marketing, delivering) and support (activities that allow primary activities to occur) activities - Business Process Generates Value - Business process: network of activities that generate value by transforming inputs into outputs - Cost of BP = cost of inputs + cost of activities - Margin = value - cost - Streamlining BP increases value (business process design) but not easy to do, requires people to work in new ways - How Does IS Create Competitive Advantage - Product implementation: create new product/service | enhance existing products | differentiates products - Process implementation: locks in customers | locks in suppliers | raises barriers to market entry | establish alliances | increase profit margin by decreasing cost/errors Business Intelligence System (Ch. 3) - BI: information system that process operational + data to identify patterns, relationships, and trends for business professionals and other knowledge workers - Conponenets: hardware, software (BI application), data, procedures, people - Alteratives for publishing: email/collaboration tool (static, manual, low), web server (static/dynamic, alert/RSS, low static, high dynamic), sharepoint (static/dynamic, akert/RSS, workflow, low static, high dynamic), BI server (dynamic, alert/RSS, subscription, high) - Users: predict/identify change in purchasing patters (amazon customers purchased this and also bought), entertainment (Netflix anaylyzes watching, listening), predictive law enforcement (analyze data: location, date, type of crime, etc) - Primary Activities : Data acquisition (obtaining, cleaning, organizing, relating, cataloging source data) | BI analysis (creating BI, reporting, data mining, big data, acknowledgement management) | Publish results (delivering BI to knowledge workers, push publishing delivers BI w/o request, pull publishing requires user to request BI results) | Data warehouse/marts (operaional data not ideal bc secuirty, control, and structure. Functions of DW: extracts data from operational, internal and external database, cleanse data, organize, relate DW, catalog w/ metadata. Data mart (addresses particular component or functional area of business) = subset of data warehouse - Reporting Applications - Recently Frequently Money (RFM): analyze and rank customers according to purchasing patterns - Scores: sort customer purchase records by data of most recent purchase, divide into quintiles, Score of 5 to 1 5 is best, Process repeated for frequently/money - Outline Analytical Processing (OLAP): provides ability to sum, count, average groups of data, dynamic, dimension = characteristic of measure (purchase date), measure = data item of interest to be summed or averaged (total sales, average sales) - Big Data : huge volume - petebyte and larger, rapid velocity - generated rapidly, great variety = structured data, free-form text, log files, graphics, audio, video - Knowledge Management : create value from intellectual capital + sharing knowledge, preserving organizational memory caputring/storing lessons and best practice of key employees - Benefits: improve process quality, increase team strength, GOAL: enable employees to sue organizations collective knowledge Hardware, Software, Mobile Systems (Ch. 4) - Hardware: CPU, Ram, Storage(non-volatile: hard drive, solid state, flash, CD; volatile: cache & memory; measured in GB) - Computer Data: represented by bits that are grouped into 8-bit chunks known as a byte - Disruptive hardware technologies: self driving cars, digital reality, 3D printing, cryptocurrencies - Virtualization: process by which one physical computer hosts many different virtual computers within it - Native applications and web applications - Open Source: No license fee: Libre office, Firefox, Apache, Ubuntu, Android - Native applications: written to use a particular operating system Data Base Processing (Ch. 5) - Database: organize & keep track of thinks, keep track of multiple themes; single theme use spreadsheet, multiple use database - Primary Key: column that identifies a unique row in a table - Foreign Key: a column that refers back to a primary key of a different table, represents a relationship - Data Integrity Issues: incorrect of inconsistent information, users lose confidence in information, system gets a poor reputation - SQL Structured query language: international standard, used by nearly all DBMS - Multiuser processing problem: lost-update problem, ticketmaster seat reserver - ERD (Entity Relationship Diagram)Entities, attributes, identifier - Normalization: converting poorly structured tables into two or more well-structured tables - Users Role: users are final judges, users review of data model is crucial for the business The Cloud (Ch. 6) - Cloud: elastic leasing of pooled computer resources over the internet - Elastic: leased computing resources, dynamically increased/decreased programmatically where organizations only pay for resource - Pooled: many organizations share same physical hardware through virtualization - Over the internet: servers not stored locally, no need to hire - Cloud computing era: 2008-current, cheap processors, virtualization technology, internet based standards - Cloud doesn't make sense: law or standard industry practice require physical control or possession of data, financial or health care - 3 types of cloud services: SaaS (employees/customers), PaaS (application developers/testers), IaaS (network architects) - Content delivery network(CDN): stores user data in many different geographical locations and makes data available on demand Quiz 1 1. You run Salt Lake's most successful diamond and jewelry store. One morning, you hear the news that overnight, one of the mines that your gems are harvested from has been detonated with C4. According to Porter's 5 Forces model, which threat is your jewelry store facing? Power of suppliers 2. McDonald's chooses a division of labor where their staff is inexperienced and must be trained before they can serve the general public. Thus, they do not have to pay high salaries to their workers. What kind of strategy has McDonald's successfully employed? Cost Leadership
3. Each year, you become excited when the new Apple iPhone releases. You would pay $2,000 for the latest and greatest Apple technology. What concept does this demonstrate? Value 4. After a successful marketing campaign, your company has sold over 125,000 units of its automated flying car. However, you have no idea how you plan to ship all these huge cars. What primary activity is your issue derived from? Outbound logistics 5. After working closely with the operations team of your company, you notice that the value chain seems to be more integrated than ever. What concept did your firm utilize? Linkages 6. King Kong Construction implements DOMO Business Intelligence software to achieve optimal efficiency and cost in allocating workforce to construction projects. By doing this, King Kong has achieved competitive advantage by _______. Reducing cost via process implementations 7. Best Buy has an approarch that involves greeting customers when they walk through the front doors, offering assistance when people begin browsing through their product offerings, assisting with payment through payment plans, and offering returns for products that didn't meet customer expectations. What is this approach known as? Business process 8. Uber, a ride-sharing app, began offering their services much before other now popular ride-sharing apps such as Lyft and Juno. What strategy did Uber benefit from? First Mover Advantage 9. A baking company uses eggs, sugar, flour, chocolate chips, and water to create cookies. This is the ______ activity of their value chain. Operations 10. Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________. Lock in customers Quiz 2 1. BI systems have 5 standard components. These are hardware, software, data, procedures, and _______. People 2. If you are asking questions such as, "How can we increase sales?" and, "How can we reduce food waste?" You are in the _________ task of Business Intelligence Systems. Problem solving 3. At the end of each year, Spotify, a digital musical service, sends a report to each of their listeners explaining how much time they spent listening to music, their favorite artists, songs, and albums. This is an example of _____ publishing. Push 4. Your startup company has begun making sales across the nation. You want to find out exactly how well the sales of your company has been doing by city. However, your data analyst tells you that they only have a system that can determine total sales by state. What problem is occurring with your startup's data? Granularity 5. You are the CFO of a large firm in Salt Lake City. You receive a report each quarter of all the data your Finance department has utilized for the past three months. It is likely that the data was obtained from a data mart. True 6. ___ analysis is a way of analyzing and ranking customers according to their purchasing patterns. RFM 7. ____ requires the user to request business intelligence (BI) results. Pull publishing 8. ____ is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety. Big data 9. Which of the following statement is true about unsupervised data mining? Analysts do not create a model or hypothesis before running the analysis. 10. Problematic operational data is termed as __. Dirty data Quiz 3 1. Your local dentist utilizes a complex application that specifically tracks the status of teeth and the progression of abnormalities, such as cavities. What type of application is being used? Vertical market application 2. iPhones come with a pre-downloaded application called “Weather-” in which information can be found on the current and predicted weather anywhere in the world. This application is only available to and compatible with iOS. What type of application is this an example of? Native application 3. Your new boss lets you know that, if you choose to bring your personal laptop to work, you will be held responsible for any damage or information loss. This is an example of BYOD policy 4. You are developing a new scheduling application for your personal business. The project has a relatively small budget and you don’t believe it will increase appointments- merely the convenience of scheduling them. What type of application best suits your needs? Thin-client application 5. Snapchat is a social media application that is free to download and to use. What is Snapchat’s monetized product? You are the product 6. Pokémon Go is a mobile application that uses the camera and GPS system of a user’s phone to digitally superimpose imaginary creatures on top of real-world scenery. This is an example of Augmented reality 7. Garlicoin- which traded at a price as high as $2.11 per “coin” is a digital only currency. It was able to gain real value because of its popularity- despite having no gold backing. What is Garlicoin an example of? Cryptocurrency 8. The University of Utah has legally obtained the right to install Microsoft Office software on all of the computers available to students for use at the Marriot Library. This is an example of a Site License 9. The United States Military requires a high-security, one of a kind application to fit their unique needs. Which of the following is NOT true about a one of a kind application? They are relatively inexpensive to develop 10. A computer’s CPU controls the flow of data according to its instructions. CPU’s depend on a group of microchips located on the motherboard to process information. What is the CPU an example of? Hardware Quiz 4 1. Many business students may question why a database is necessary for a business to track information. "Why not just use an Excel spreadsheet?" Which reason explains why database processing is a crucial feature for any business to utilize? Databases can keep track of multiple themes. 2. Which programming language do businesses utilize to code inside a database? SQL 3. You are tasked with helping a startup company create a new database. However, you do not know much about database processing. You choose to hire a vendor such as IBM or Microsoft to help through this process. What is this type of program called? Database Management System 4. Your boss wishes for you to find all customers who live out of state by using a SQL command within the database. Is this something that is possible to achieve through SQL? True 5. Before companies actually start on building a database, they often start out with a data model to determine which components are required for the database to be effective. True 6. Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________. Primary key 7. You have been assigned the task of creating a data model for the organization you work for. You begin to research the various components of a data model and find that entities are the "verbs" of a model and attributes are the "nouns." False 8. When you begin entering data into the database you have created for your organization, you realize that information is poorly structured and will cause issues further down the road. Perhaps you should break up the information into more, well-structured tables. Which process should you most likely undergo to alleviate the database of future error? Normalization 9. What is true about the diagram below? A department may not have an advisor 10. You have just begun working at a company who is starting to restructure their database. They have asked you to review the data model that was once used to build the database that is in effect today. However, you realize that the data model has two entities that were never added into the real database. Since they are not part of the actual database, it is not necessary to question if they should be incorporated when you meet with the IS department after your review. False Quiz 5 1. You own a company that outsources the manufacture of its product. The larger your order, the lower average cost per unit. What benefit does your company have in common with the cloud? Economies of scale 2. After a piece of mail is addressed, the Postal system puts a “registered mail” sticker on the package. This sticker guarantees the delivery of the package. Similarly, after a packet of information is addressed on the Internet to a specific IP, what guarantees the timely and accurate delivery of the information packet? Transmission control protocol (TCP) 3. Netflix accounts for more than 30 percent of all Internet traffic in America between 9 PM and 12 AM. Video streaming requires a relatively high amount of bandwidth to process. For this reason, Netflix most likely supports Net Neutrality. True 4. A criminal investigator is working on a case involving cybercrime. They’ve been able to trace the origin of the suspicious activity to a local public library. Which of the following made this discovery possible? IP Address 5. You are a small vendor that operates an online store. You decide to use cloud technology to help process orders/online activity and to store data. Which of the following is NOT a benefit of this decision? Visibility of security 6. Apple’s Airpods are able to utilize wireless network technology to connect to a user’s cellular device and play high-quality audio. Which type of network is this an example of? 7. Content Delivery Networks are able to decrease load-time, increase reliability, and reduce the workload on the origin server. Which of the following characteristics of CDNs contributes to these benefits? They are geographically distributed 8. University of Utah employees utilize Office 365 and its cloud capabilities to store and collaborate on files from multiple devices. This is an example of SaaS 9. A lawyer with clients is concerned with the security of their data and wishes to maintain complete control over their data location. Under these circumstances, it would make sense for this legal office to store their data in the cloud. False 10. Similar to home electricity use, the cloud allows organizations to dynamically increase and decrease programmatically so that they only pay for the resources that they actually use. This is because cloud use is ____. Elastic
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help