Untitled Deck Flashcards

(72 cards)

1
Q

What is the Information Age and what are the differences between data, information, business intelligence, and knowledge?

A

• Info Age: time when info is key resource
• Data: raw facts
• Information: organized/meaningful data
• Business intelligence: data + analysis to support decisions
• Knowledge: BI + manager’s experience → decisions, insights & action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is systems thinking and how do MIS enable business communication?

A

• Systems thinking: view process as a whole with inputs/outputs/feedback/ how different part interact
• MIS: link people, processes, and technology
• Helps departments communicate and align

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are competitive advantages temporary?

A

• Competitors copy or catch up
• Tech & markets evolve quickly
• Must keep innovating to maintain edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four key areas of SWOT analysis?

A

• Strengths (internal)
• Weaknesses (internal)
• Opportunities (external)
• Threats (external)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Porter’s Five Forces?

A

• Supplier power
• Buyer power
• Threat of new entrants
• Threat of substitutes
• Rivalry among competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Porter’s three generic strategies?

A

• Cost leadership: lowest cost, broad market
• Differentiation: unique product/service, broad market
• Focus: cost or differentiation, narrow nich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is decision making important at different organizational levels?

A

• Operational: structured, day-to-day
• Managerial: semi-structured, improve efficiency
• Strategic: unstructured, long-term planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are CSFs and KPIs, and how do managers use them?

A

• CSF (Critical Success Factors): key goals to achieve success
• KPI(Key Performance Indicators): measurable indicators of performance
• Managers track KPIs to see if CSFs are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of support systems and how do managers use them?

A

• Operational: TPS (Transaction Processing System) → day-to-day tasks
• Managerial: DSS (Decision Support System) → evaluate choices
• Strategic: EIS (Executive Information System) → long-term planning
• Each provides data for better decisions & competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the value of business processes, and what’s the difference between customer-facing and business-facing?

A

• Value:
1. Efficiency – doing things faster, cheaper, with fewer errors.
2. Effectiveness – achieving business goals and satisfying customer needs.
3. Consistency – standardizing operations so results are predictable.
4. Competitive Advantage – improving performance or differentiation to outperform competitors.
• Customer-facing: directly interact with customers (sales, support)
• Business-facing: internal, no customer contact (training, payroll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is business process modelling and what’s the difference between As-Is and To-Be models?

A

• Modelling: mapping processes to analyze & improve
• As-Is: current process
• To-Be: improved/future process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between automation, streamlining, and reengineering?

A

• Automation: tech replaces manual tasks
• Streamlining: remove inefficiencies, smooth process flow
• Reengineering: redesign whole process for big improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AI and what are its six branches?

A

computer systems designed to perform tasks normally done by a human

• Expert systems
• Machine learning
• Deep Learning (neural networks)
• Robotics
• Computer vision
• Natural language processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare disruptive and sustaining technologies and explain how the Internet and WWW caused business disruption

A

• Disruptive tech: Creates a new market, disrupts existing ones (e.g., digital cameras).
• Sustaining tech: Improves existing products/services (e.g., faster processors).
• Internet/WWW disruption: Enabled global communication, e-commerce, instant info, new business models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe e-business and its associated advantages.

A

• Conducting business online.
• Advantages: Reach global markets, reduced costs, 24/7 availability, personalized service, improved efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compare the four e-business models

A

• B2B: Business to business (most common).
• B2C: Business to consumer (Amazon).
• C2B: Consumer to business (Fiverr).
• C2C: Consumer to consumer (eBay).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the five e-business tools for connecting and communicating.

A

• Email
• Instant messaging/teams/
• Web/video conferencing
• Content Management Systems (CMS)
• Podcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain Web 2.0 and identify its four characteristics.

A

User-generated content
Collaboration
Rich User Experience
Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain how Business 2.0 is helping communities to network and collaborate.

A

• Social media, wikis, blogs, crowdsourcing.
• Encourages user-generated content, collective knowledge, collaboration across borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe Web 3.0 and the next generation of online business.

A

• “Intelligent web” — decentralized, block chain technology , personalized, AI-powered.
• Focus on context, machine learning, linked data, virtual assistants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the ethical issues in the use of information technology.

A

• Privacy, intellectual property, digital divide, data security, employee monitoring, accuracy of data, automation replacing workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify the six e-policies organizations should implement to protect themselves.

A

• Ethical computer use
• Information privacy
• Acceptable use
• Email privacy
• Social media
• Workplace monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the relationships and differences between hackers and viruses.

A

• Hackers: People who break into systems.
• Viruses: Malicious software programs that spread automatically.
• Related: Hackers often create or distribute viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the relationship between information security policies and an information security plan.

A

• Policy: High-level rules/expectations for security. What/why
• Plan: How to implement those policies — technologies, processes, roles. How/roadmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Provide an example of each of the three primary information security areas.
• Authentication & authorization: Passwords, biometrics, multi-factor. • Prevention & resistance: Firewalls, encryption, intrusion prevention. • Detection & response: Intrusion detection, audit logs, incident response plans.
26
MIS Infrastructure (3 primary types)
• Information MIS infrastructure – supports operations (backup, recovery, disaster recovery, business continuity). • Agile MIS infrastructure – supports change (accessibility, availability, portability, scalability, reliability, usability). • Sustainable/Green MIS infrastructure – supports sustainability (grid computing, virtualization, cloud computing).
27
Three primary areas of Information MIS infrastructure
• Backup & recovery – copy and restore data. • Disaster recovery – plan for unexpected disruptions. • Business continuity planning – ensures operations continue after major disruption.
28
Characteristics of Agile MIS infrastructure
• Accessibility – who can access what. • Availability – system uptime. • Maintainability – system updates/changes. • Portability – usable on different devices/platforms. • Reliability – consistent accuracy. • Scalability – handles growth. • Usability – easy to learn/use.
29
Environmental impacts of MIS
• Energy consumption – data centers use massive power. • E-waste – disposal of electronics. • Carbon emissions – from hardware, servers, cooling.
30
Three components of sustainable MIS infrastructure
• Grid computing – resources from many computers pooled together. • Virtualization – multiple systems/apps on a single machine (less hardware). • Cloud computing – shared resources/services via Internet. • Benefits – saves money, reduces energy use, scalable, flexible.
31
Four traits determining data value
• Accuracy – correct info. • Completeness – no missing info. • Consistency – same format across systems. • Timeliness – up-to-date.
32
Define Database, DBMS, relational model
• Database – organized collection of data. • DBMS – software for managing databases. • Relational model – stores data in rows (records) & columns (attributes). How data is stored in a data base, or the theory
33
Business advantages of relational databases
• Increased flexibility (queries, reports). • Increased scalability/performance. • Increased integrity/accuracy. • Increased security (access control). • Reduced redundancy/inconsistencies.
34
Advantages of Business Intelligence (BI)
• Supports better, faster decision making. • Identifies patterns & trends. • Provides competitive insights. • Improves efficiency & profitability.
35
Data warehouses & data marts
• Data warehouse – central, company-wide system connecting multiple databases for decision making and big picture insights • Data mart – smaller, focused database (department-specific). • Purpose – organize and consolidate data for analysis and BI.
36
Blockchain & advantages over centralized relational DB
• Blockchain – distributed ledger storing records in linked blocks. • Advantages: • Decentralized – no single point of control/failure. • Secure & transparent – immutable transactions. • Efficient – reduces need for third parties. • Trusted – tamper-resistant.
37
Explain a digital ecosystem
• Apple ecosystem, which integrates various services like iPhones, iPads, Macs, Apple Music, iCloud, and the App Store, all designed to work seamlessly together to keep users within Apple's network. Network of interconnected organizations, systems, and digital tools • Shares data, services, and processes for efficiency • Promotes collaboration, innovation, and competitiveness
38
Identify the components of a digital network
• Hardware: routers, switches, servers • Software: operating systems, apps • Protocols: rules (e.g., TCP/IP) • People: users, admins • Data: information being transmitte
39
Explain how 5G and Wi-Fi 6 are changing business and streaming
• Faster speeds, lower latency • Supports IoT, real-time communication • Enables AR/VR, remote work, cloud gaming • Improves streaming quality (4K/8K, no lag)
40
Identify security concerns with digital ecosystems
• Data breaches & hacking • Insider threats • Network vulnerabilities • Privacy issues (personal data misuse) • Dependence on third parties
41
Describe augmented reality (AR) and virtual reality (VR)
• AR: overlays digital info on real world (e.g., Pokémon Go, IKEA app) • VR: fully immersive digital environment (e.g., Oculus gaming, training simulators)
42
Explain the three primary business applications of wireless technology
•. Radio Frequency Identification RFID: tracks goods/assets in real-time • GPS: navigation, logistics, fleet tracking • Geographic Information System GIS: maps, location-based analysis & decision-making
43
Explain mobile enterprise management and its importance to a business
• Managing employee mobile devices, apps, and data • Ensures security, compliance, and efficiency • Supports remote work and BYOD (Bring Your Own Device) policies
44
Explain the ethical concern associated with the digital divide
• Unequal access to technology & internet • Creates barriers in education, jobs, healthcare • Worsens economic and social inequality
45
Explain integrations and the role they play in connecting a corporation
• Connects systems & apps so data flows seamlessly • Prevents “data silos” • Improves communication, productivity, and decision-making
46
Describe supply chain management (SCM) and its impact on business
• Oversees flow of goods, info, and finances • Ensures products are delivered efficiently • Reduces costs, improves customer satisfaction
47
Identify the three technologies that are reinventing the supply chain
• 3D Printing: on-demand manufacturing • RFID: real-time product tracking • Drones: faster delivery, inventory monitoring
48
Explain operational and analytical customer relationship management (CRM)
• Operational CRM: automates customer-facing processes (sales, service, marketing) • Analytical CRM: analyzes customer data for insights (trends, preferences, profitability)
49
Identify the core and extended areas of enterprise resource planning (ERP)
• Core ERP: finance, HR, manufacturing, accounting • Extended ERP: CRM, SCM, business intelligence, e-business apps
50
Discuss the current technologies organizations are integrating in ERP systems
• Cloud ERP (scalable, accessible) • Mobile ERP (real-time use) • AI & machine learning (predictive insights) • IoT integration (smart data collection) • Blockchain (secure transactions, traceability)
51
Describe the seven phases of the systems development life cycle (SDLC):
• Planning – define goals, scope, feasibility. • Analysis – gather requirements, study current system. • Design – create technical blueprints. • Development – actual coding/programming. • Testing – find bugs, confirm system meets requirements. • Implementation – deploy system to users. • Maintenance – ongoing fixes, updates, improvements.
52
Summarize software development methodologies:
• Waterfall – step-by-step, linear. • Agile – iterative, flexible, fast feedback. • RAD (Rapid App Dev) – fast prototyping, less planning. • Extreme Programming – small releases, constant testing. • Scrum – team sprints with regular check-ins.
53
Explain project management + reasons projects fail:
• Project management = planning, organizing, managing tasks/resources. • Reasons projects fail: unclear goals, poor planning, lack of resources, weak leadership, scope creep, inadequate communication.
54
Identify primary planning diagrams:
• Program Evaluation and Review Technique PERT Chart – shows tasks & dependencies. • Gantt Chart – timeline of tasks.
55
Three types of outsourcing (benefits & challenges):
• Onshore – same country. ✅ easy communication ❌ higher cost. • Nearshore – nearby country. ✅ lower cost ❌ cultural/time zone gaps. • Offshore – distant country. ✅ lowest cost ❌ quality, time, culture issues.
56
Six hardware categories (with examples)
• Input – keyboard, scanner. • Output – monitor, printer. • Storage – SSD, HDD. • Processing – CPU. • Communication – router, modem. • Miscellaneous – VR headset, IoT sensors.
57
Different computer categories & business uses:
Smartphone/PDA(Personal Digital Assistant) Handheld/pocket computer Laptop/notebook Tablet/portable Personal Computer/Desktop- public Mini computer/workstation - small to medium office Mainframe- medium office, math science Supercomputer - large office, science research
58
Two main types of software:
• System software – OS, utilities. • Application software – productivity, business apps.
59
Compare LANs, WANs, MANs:
• LAN – local network (office, building). • MAN – city-wide (campus, municipality). • WAN – global (internet).
60
Two types of network architecture:
• Client/Server – centralized, managed. • Peer-to-Peer (P2P) – decentralized, equal roles.
61
Topology types: Ways of orienting a system
• Bus – single line. • Star – devices connect to central hub. • Ring – circular connections. • Mesh – fully interconnected. • Hybrid – mix of above.
62
Protocols & importance of TCP/IP:
• Protocols = rules for data transfer. • Transmission Control Protocol TCP/IP – foundation of internet; ensures reliable transmission.
63
Media types in networks:
• Wired – coaxial, twisted pair, fiber-optic. • Wireless – Wi-Fi, cellular, satellite, Bluetooth.
64
Basic components of relational database model:
• Tables – rows (records) + columns (fields). • Primary key – unique identifier. • Foreign key – links tables. • Relationships – connect data across tables.
65
Importance of documenting ER diagrams:
Entity Relationship Diagram Used for planning and designing a database Visual representation of a database’s structure: entities, attributes and their relationships. • Helps developers & stakeholders understand the bigger picture and communicate • Prevents design errors.
66
Need for ER diagrams in DBMS:
• Shows logical structure before building. • Provides blueprint for efficient design.
67
Global trends impacting future business:
• AI & automation. • Big data & analytics. • Cybersecurity threats. • Climate/sustainability concerns. • Remote & hybrid work.
68
Why businesses use trends to assess future:
• identify opportunities and threats • Guide strategy & investment. Resource allocation Risk management
69
Technologies with greatest impact on future business:
• AI/ML. • Blockchain. • IoT. • Cloud computing. • Quantum computing (emerging).
70
Five networking (types of networks) elements creating a connected world:
• Intranet. • Extranet. • Internet. • VPN (virtual private network). • Wireless/mobile networks.
71
Benefits of a connected world:
• Global collaboration. • Fast information sharing. • Remote work enablement. • E-commerce growth.
72
Challenges of a connected world:
• Security risks. • Privacy concerns. • Digital divide. • Infrastructure cost/maintenance.