1 / 18

Review

Review. Exam 1 Chapters 1 - 5. Chapter 1 – MIS and You . MIS, IS, and IT IS Components Hardware Software Data Procedures People Information and Data Information Characteristics Accurate: cross check Timely: real time Relevant Just barely sufficient Worth its cost Moore’s Law

demitrius
Télécharger la présentation

Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Review Exam 1 Chapters 1 - 5

  2. Chapter 1 – MIS and You • MIS, IS, and IT • IS Components • Hardware • Software • Data • Procedures • People • Information and Data • Information Characteristics • Accurate: cross check • Timely: real time • Relevant • Just barely sufficient • Worth its cost • Moore’s Law • Discussion and Case Study

  3. Chapter 1 - Discussion • Security: password and password etiquette (5a-b) • Ethics: misdirected information use (11a-b)

  4. Chapter 1 - Case Study • Case 1-1 Computerizing the Ministry of foreign Affairs (20-21) • Case 1-2 IRS Requirements Creep (21-22)

  5. Chapter 2 Purpose of Information Systems • Information Systems Purposes • Competitive Advantage • Problem Definition • Decision Making • Competitive Advantage • Products • creation of barriers • Establishing alliances • Reducing costs • Problem Definition • Customer relationship management (CRM) system • Knowledge management system (KMS) • Manufacturing Quality-Control Information System • Decision Making Dimension • Transaction processing systems (TPS) • Management information systems (MIS) • Executive information systems (EIS) • Discussion and Case Study

  6. Chapter 2 - Discussion • Security (27a-b) • Name the competitive advantages for a financial institution by implementing security system • The cost of no security for a financial institute • Ethics (29a-b) • Social impact of the digital divide • Responsibility for business and government • Opposing forces (31a-b) • Can a business survive without any IS? • Egocentric vs. empathetic thinking (33a-b) • How to apply this concept in developing and using IS?

  7. Chapter 2 - Case Study • Case study 2-1Microsoft Customer Support (41-42)

  8. Chapter 3 – Hardware & Software • Computer • Hardware • Input, processing, output, storage, and communication • Computer Data and Instruction • Microsoft Windows: Intel instruction set by Intel Corporation • Macintosh computers: PowerPC instruction set using Powerful PC processor • CPU (Central Processing Unit) and memory • Computer Performance • The speed of main memory • The speed and width of the data bus • Software • Operating system (OS) • Application software • Computer Virus • Type • Prevention

  9. Chapter 3 - Discussion • Security (53a-b) • How to enforce employees to follow the antivirus policy and procedure in any organization • State your opinions related to the statement “the viruses are developed by the antivirus software vendor” • Opposing forces (57a-b) • State your opinions related to the statement “the new computer products are the conspiracy between hardware and software vendors to ripe off consumers” • Ethics (61a-b) • State your opinions about the major impacts in terms of social, entertainment, government, and business operations by implementing the TCG/NGSCB (Trusted Computing Group/Next Generation Secure Computing Base)

  10. Chapter 3 - Case Study • Case 3-1 (69-70) Wall Data IS Support: every one except 6 & 9 • Case 3-2 (70-71) Dell Leverages the Internet: questions 1 & 2

  11. Chapter 4 – Database Processing • Purpose of Database • Components of Database System • User, application, DBMS, and database • Multi-user Processing • Relational Database Design • Entity-relationship Model • Primary key, foreign key • Relationship (dependent and independent) • Cardinality • Normalization • Database Administration • DBA and steering committee • Database Security • Firewall, OS and DBMS patches, physical security, logical security, logs and security emergency plan • Discussion, Design, and Case Study

  12. Chapter 4 - Discussion • Ethics (81a-b) • What should the company do to avoid the situation at first place? • What should the company do to properly handle Kelly’s case • What should Kelly do to avoid the stated consequence after querying the database? • What could Kelly do to save his career? • Opposing forces (97a-b) • What should the DBA of car dealer do to convince every salesperson to build and use a solid sales information database? • Reflections (101a-b) • What should the DBA of any organization to handle the changing requirements for a new database? • What should the DBA of any organization to handle the new requirements for a existing database?

  13. Chapter 4 - Relational Database Design • Given the following entities and their attributes • Buyer (BuyerID, BuyerName) • Owner (OwnerID, OwnerName) • Property (PropertyID, PropertyAddres, OwnerID) • Agent (AgentID, AgentName) • Sales (SalesID, BuyerID, OwnerID, PropertyID, AgentID, Price, Date) • Design a relational database • Create primary key for every entity and the necessary foreign key • Create an entity-relationship diagram

  14. Chapter 4 - Case Study • Assignment 22 (105) • Case 4-1 (107-110): questions 1, 4, and 7 (add aircraft for 7) • Case 4-2 (110-113): questions 1 and 2

  15. Chapter 5 - Telecommunication & Internet Technology • Network Concepts • Protocol, wire, modem • TCP/IP-OSI Architecture • Application, transport, Internet, data link, physical • Network Types • LAN • WAN • Public Switched Data Network (frame relay, asynchronous transfer mode, and Ethernet) • Virtual Private Network • Network Comparison • Internet • Domain Name System • IP Addressing Schemes • Security

  16. Chapter 5 - Discussion • Problem solving (121a-b) • What are the new opportunities for the business generated by the Internet? • What are the new threats for the business generated by the Internet? • Opposing forces (129a-b) • State your opinions related to the negative impact on the society when everyone is connect through the Internet. • Security (133a-b) • State the impacts on the society and business from the government having an decryption method to decode everything over the Internet. • Ethics (141a-b) • State the impacts from the employee’s private usage of company’s computer facility. • Reflections (143a-b) • How should you react properly from not getting lost from this Internet age?

  17. Chapter 5 - Case Study • Case 5-1 (148-149) Network Services: questions 1, 3, 4, 5, 6, 9, and 10

  18. Assignments • Electronic Billing Payment System • Computer System for College Freshman

More Related