click below
click below
Normal Size Small Size show me how
BISM 2101
Information Systems Terms
Is | Answer |
---|---|
Information System | a set of interrelated components that collect, manipulate,store, and disseminate data and information and provide a feedback mechanism to meet an objective. |
components of an information system | : Feedback >Inputs>Processing > Output>Feedback |
Characteristics of valuable information | accurate, complete, economical, flexible, reliable, relevant, simple, timely, verifiable, accessible, and secure |
Data versus information | : data consists of the raw facts, such as an employee’s name and number of hrs worked, inventory numbers, or sales orders. Information consists of a collection of facts organized in such a way that they have additional value beyond the value of the fact |
Intranets/Extranets | an internal network based on Web technologies that allows people within an organization to exchange information and work on projects. / A network based on Web technologies that allow selected outsiders, such as business partners and customers, to access a |
Enterprise Resource Planning Systems | is a set of integrated programs that is capable of managing a company’s vital business operations for an entire multisite, global organization. |
Transaction Processing Systems (TPSs) | an organized collection of people, procedures, software, databases and devices used to record completed business transactions. |
Technology diffusion | a measure of how widely technology is spread throughout an organization. |
Management Information Systems (MISs) | an organized collection of people, procedures, software, databases, and devices used to provide routine information to managers and decision makers. |
Five-Forces model | the rivalry among existing competitors, the threat of new entrants, substitute products and services, the bargaining power of buyers, and the bargaining power of suppliers. |
7 Strategies for competitive advantage | altering the industry structure, creating new products and services, improving existing product lines, forming alliances, developing niche markets, maintaining competitive cost, and creating product differentiation. |
Central Processing Unit: | the part of the computer that consists of two associated elements; arithmetic logic unit and the control unit. |
arithmetic/logic unit | the portion of the CPU that performs matematical calculations and makes logical comparisions. |
Control unit | the part of the CPU that sequentially accesses program instructions and decodes them, and coordinates the flow of data in and out of the ALU, primary storage, and even secondary storage and various output devices. |
Determinates of CPU speed | clock speed & word length |
clock speed | a series of electronic pulses at a predetermined rate, which affects machine cycle time |
word length | the number of bits the CPU can processat any one time. |
• RAM—characteristics | a form of temporary volatile/sensitive memory. Found on comps main circuit board or peripheral cards. |
• ROM--characteristics | : a nonvolatile form of memory permanent storage for data. |
proprietary software | one of a kind software for specific applications, usually developed and owned by a single company. |
Off-the-shelf software | an existing software program that is purchased |
Graphical-user interface | an interface that uses icons and menus displayed on screen to send commands to the computer system. |
Multitasking | the capacity that allows a user to run more than one application at the same time. |
Scalability | the ability to increase the capability of a computer system to process more transactions in a given period by adding more, or more powerful, processors. |
Secondary storage | : the devices that store larger amounts of data, instructions, and information more permanently than allowed with main memory. |
Magnetic tapes | : a secondary storage medium similar to the kind of tape found in audio and video cassette, it is Mylar film coated with iron oxides portions are magnetized to represent bits |
Magnetic disks | also coated with iron oxide they are thin steel platters of Mylar film the bits are represented by small magnetized areas. |
Optical devices | provide direct and sequential access |
Operating system | a set of computer programs that control the computer hardware and act as an interface with application programs |
application software | the primary function is to apply the power of a computer to give individuals, workgroups, and the entire enterprise the ability to solve problems and perform specific tasks |
systems software | controlling the operations of computer hardware is one of the most critical functions |
Graphics adapter card | A board that plugs into a personal computer to give it display capabilities. |
Data redundancy--data integrity | : the duplication of data in separate files is called data redundancy. Therefore, it conflicts with data integrity—the degree to which the data in any one file is accurate. |
Primary key | a unique set of fields that identifies the record |
Traditional approach of data organization | an approach whereby separate data files are created and stored for each application program. |
database approach to organizing data | an approach whereby a pool of related data is shared by multiple application programs. |
Relational database model | a database model that describes data in which all data elements are placed in two-dimensional tables, called relations that are the logical equivalent of files. |
Data dictionary | A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. |
Data warehouse | collection of data designed to support management decision making |
distributed database | A database that consists of two or more data files located at different sites on a computer network. Because the database is distributed, different users can access it without interfering with one another. However, the DBMS must periodically synchronize |
Online Analytical Processing | a category of software tools that provides analysis of data stored in a database. |
TCP/IP | Transmission Control Protocol TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. the IP proto |
router | A device that forwards data packets along networks. A router is connected to at least two networks |
Transmission media | In computer networks, media refers to the cables linking workstations together. |
VOIP | Short for Voice over Internet Protocol, a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit |
Content streaming | A technique for transferring data such that it can be processed as a steady and continuous stream. |
Cookie | A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. |
Digital signature | A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she |
Workgroup computing | Workgroup computing occurs when all the individuals have computers connected to a network that allows them to send e-mail to one another, share data files, and schedule meetings. |
Push technology | In client/server applications, to send data to a client without the client requesting it. |
Virtual private network (VPN) | a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. |
Firewall | A system designed to prevent unauthorized access to or from a private network. |
Encryption | The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. |