CIS final

Card Set Information

CIS final
2011-12-13 13:45:48
CIS final

CIS finals
Show Answers:

  1. Sources of competitive advantage
    a. New products, services, and business models

    b. Charging less for superior items

    c. Responding to customer in real time
  2. Information system
    manage information to support decision making and control in an organization
  3. Culture
    assumptions, values, and ways of doing things
  4. 4 step model of business problem solving:
    identifying the problem
  5. 4 step model of business problem solving;
  6. branding products
    a function of marketing
  7. decision-support system
    systems designed to help with unstructured decision making
  8. Executive support systems
    (ESS)-designed to support senior mngs (for executives) {long range planning}
  9. Enterprise system
    collects data from business processes and stores that data in a single repository for retrieval.
  10. Supply-chain management
    help suppliers, purchasing firms, distributors, and logistics share info about orders, production, inventory, and delivery
  11. Four strategies to deal with a competitive marketplace
    • a. Strengthen customer and supplier intimacy
    • b. Focus on the market niche
    • c. Product differentiation
    • d. Low cost leadership
  12. Market niche strategy
    appeals to one specific type of customer in a mk-mk focus
  13. Mass customization
    ability to offer individually tailored products or services using the same production recourses’ as mass production
  14. value chain model
    highlights specific activities in the b2n2 where competitive stat can be applied
  15. benchmarking
    setting standards then measuring performance against standards
  16. Value chain linked to
    value chain of suppliers, distributers, and customers
  17. system software
    manages the resources of computer
  18. co-location
    you own your own server, but you put it somewhere else {store data in 2 diff places often off-site}
  19. distributed processing
    use of multiple computers linked by a communications network for processing
  20. autonomic computing
    systems that can configure, optimize and heal themselves
  21. client
    the computer thats the users point of interest {PC capable of recieving a service provided by another program}
  22. mashup
    combo of combining two services for one thing ex: retail site+online maps
  23. total cost of ownership model
    direct and indirect cost that determine the actual costs of specific technology implemtations
  24. first step in managing data
    identify the data you need to run the business
  25. Relational DBMS
    logical DM model that treats data as if they were stored in 2D tables
  26. entity-relationship diagram
    schematic of the entire database that describes the relationships
  27. data scrubbing
    detecting and correcting data in a database file
  28. MAN
    metropolitan area network-wifi that covers the whole city
  29. controls
    all methods, policies, that keep the company safe
  30. trojan horse
    a software program that appears to be benign but then does something other than expected; a way for a virus to enter
  31. spoofing
    redirecting a link from the intended URL {making a website hijack a URL}
  32. evil twins
    bogus wifi networks that look legitimate
  33. ERP systems
    suite of integrated software models that lets data be used by different groups
  34. cost of overstocking warehouses
    increases inventory costs
  35. supply chain
    network of org and processes for procuring raw mat {people, systems, bznz involved in moving a product}
  36. upstream portion of supply chain
    suppliers, suppliers’ suppliers, and processes for managing that direction-anything that gives things to your company
  37. Downstream portion of supply chain
    distributing and delivering products to the final customers-going out
  38. safety stock
    allows firm to deal with uncertainties in the supply chain
  39. demand planning
    determines how much product you need to satisfy demands
  40. search costs
    the effort required to find suitable products
  41. dynamic pricing
    varying a products price according to the supply situation of the seller {bearing a products price according to supply sit of seller}
  42. Wisdom of crowds
    large numbers of people can make better decisions about a wide range of topics than a single person or a small group
  43. structured decisions
    repetitive and routine, a definite procedure for handling them
  44. unstructured decisions
    the decision maker must provice judgment evaluation, and insight to solve the problem
  45. coherence
    decisions should reflect a rational process
  46. due process
    decision is a result of a known process and can be appealed to a higher authority {result of a known process w/ appeal to a higher power}
  47. optimization models
    used to determine the right mix of products to maximize profit
  48. sensitivity analysis
    ask what if questions repeatedly to determine the impact on outcome of changes in one or more factors
  49. neural networks
    used for solving complex, poorly understood problems for which large amounts of data have been collected {systems that are built like brain, learns about decisions}
  50. unit testing
    detailed testing of individual computer programs
  51. system testing
    tests that performance of the information system as a whole
  52. acceptance testing
    provides the final certification that the system is ready to be used in production setting
  53. maintenance
    changes in hardware, software, documentation, or procedures to a production system to correct errors, meet new requirements, or improve processing efficiency
  54. data flow diagram
    offers a logical graphic model of information flow, partitioning a system into models that show manageable levels of detail {diagram that shows how data flows through PCs
  55. return on invested capital
    worth of systems from a financial prospective
  56. portfolio analysis
    help you evaluate alternitive systems, inventories all them for a firm {risk/benefit analysis of what a company should implement}
  57. output
    place where info leaves sytem to the end user
  58. knowledge workers
    people with specific info/ knowledge on a subject
  59. CIO
    chief info officer-inchange of privacy of data at a firm
  60. transparent marketplace
    info readily avail to public
  61. sensor
    measures environment around it and converts it to a digital form
  62. primary key
    unique identifier key in a DB
  63. data warehouse
    large scale centralized system related to ERP
  64. data mining
    provides insgihts into corporate data unattainable by OLAP for hidden patterns
  65. LAN
    local area network-usually between buildings
  66. peer-to-peer network
    treats all processors equally over a network
  67. wide area network
    ex: internet entire globe area
  68. bandwidth
    range of frequencies used to xmit signal
  69. TCP/IP
    transfer connect protocal-connects and transmits data over net
  70. VPN
    tunnel within a network that allows a secure connection to your data
  71. worm
    independent program that copies itself from 1 PC to another
  72. Spyware
    gathers info on users PW, use, and info
  73. DDoS
    packet injection of many computers to overload a network
  74. marketplace
    a marketplace removed from temporal boundaries
  75. price discrimination
    charge different prices for different customers
  76. intelligent agents
    autonomous programs acting on their environment