BUS361-S210-S2-unprotected.txt

Card Set Information

Author:
Anonymous
ID:
37338
Filename:
BUS361-S210-S2-unprotected.txt
Updated:
2010-09-26 00:29:06
Tags:
BUS361 S210 S2 txt
Folders:

Description:
BUS361-S210-S2.txt
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. What are computer Input Technologies?
    • Keyboard
    • Pointing Devices
    • Pen-Based Computing
    • Speech Recognition Systems
    • Optical Scanning
  2. Types of Input Technologies (Pointing Devices)
    • Electronic Mouse – Moving mouse on pad moves cursor on screen. Pressing buttons on mouse activates activities represented by selected icons.
    • Trackball – Stationary device with a roller ball on top used to move cursor on screen.
    • Pointing Stick – Small button-like device which moves cursor in direction of pressure placed on stick.
    • Touchpad – Small rectangular touch-sensitive surface which moves the cursor in the direction of finger moves on the pad.
    • Touch Screen – Video display screen that emits a grid of infrared beams, sound waves, or a slight electric current that is broken when the screen is touched.
  3. Other Input Technologies
    • Pen-based Computing: Pressure-sensitive layer under slate-like liquid crystal display screen and software that digitizes handwriting, hand printing, and hand drawing Optical Scanning: Devices that read text or graphics and convert them into digital input for your computer
    • Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices
    • Speech Recognition Systems:
    • Discrete – user must pause between each spoken word
    • Continuous – software can recognize conversationally - paced speech
    • Magnetic Stripe – devices that read data stored in the magnetic stripe on the back of cards
    • Smart Cards – devices that read a microprocessor chip embedded in a card
    • Digital cameras – devices that allow you to capture, store, and download still photos and full motion pictures
    • Magnetic Ink Recognition (MICR) – devices that can read characters printed on source documents with an iron oxide-based ink
  4. Output Technologies
    • Video Output:
    • Cathode Ray Tube (CRT) – similar to vacuum tubes in television
    • Liquid Crystal Display (LCD) – electronic visual displays that form characters by applying an electrical charge to selected silicon crystals
    • Printed Output:
    • Inkjet Printers – spray ink onto the page
    • Laser Printers – use an electrostatic process similar to a photocopying machine
  5. What computer system technologies and functions are included in self-service kiosks?
    • Input:
    • video touch screens as the primary user interface
    • Magnetic stripe card reader
    • Wireless links with PDAs, PCs, cellphones
    • Speech recognition/ pen-based handwriting
    • Image recognition, identification recognition
    • Processing - networked special-purpose microcomputer terminals, etc.
    • Output - built-in, high-speed thermal printer
  6. What is the customer value of self-service kiosks for airline check-ins? What other services should be provided? Reduced waiting time. Reduced cost for Airlines and better CRM.
  7. What is the business value of self-service kiosk in the airline industry? Do self-service kiosks give airlines a competitive advantage? Why or why not?
    • Business Value
    • Reduce business costs
    • Improve Customer relationships (CRM)
    • Parity with competitors kiosk following Sept. 11
    • Competitive necessity since most airlines have this
  8. Computer Storage - Trade-Offs
    • Cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, to optical disks.
    • High-speed storage media cost more per byte and provide lower capacities.
    • Large capacity storage media cost less per byte but slower
    • Semiconductor memories used mainly for primary storage
    • Magnetic disk/tape & optical disk devices used as secondary storage devices to greatly enlarge storage capacity.
    • Primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted (i.e. RAM is volatile)
    • Secondary storage devices provide a more permanent (i.e. non-volatile) type of storage media for storage of data and programs
    • Difference between Direct vs. Sequential Access
    • Direct (or Random) Access – Each storage position has a unique address. Each storage position can be individually accessed without having to search through other storage positions.
    • Sequential Access – Data are recorded one after another in a predetermined sequence. Locating an individual item of data requires searching the recorded data until the desired item is located.
  9. Semiconductor Memory
    • Used for Primary Storage:
    • Small, Fast, Shock Resistant, Temperature Resistant
    • Volatile – contents of memory is lost when power is interrupted
  10. RAM vs. ROM:
    • Random Access Memory (RAM) – each memory position can be both sensed and changed
    • Read Only Memory (ROM) – can be read but not erased or overwritten eg. Used for Firmware
  11. Types of Magnetic Media
    • Used for Secondary Storage: Fast, Large, Reasonably Priced,
    • Floppy Disks – single disk inside a protective jacket
    • Hard Disk Drives – several disks, access arms and read/write heads in a sealed module
    • Redundant Arrays of Independent Disks (RAID) - disk arrays of interconnected microcomputer hard disk drives
    • Magnetic Tapes - Read/write heads of magnetic tape drives record data in the form of magnetized spots on the iron oxide coating of the plastic tape.
  12. What are the Business Applications of Optical Disks?
    • Long-term archival storage of historical files of document images
    • Publishing medium for fast access to reference materials in a convenient compact form
  13. What is Radio Frequency Identification (RFID)?
    • Newest and most rapidly growing storage cum identification technologies
    • Small hardware called RFID chips (Passive and Active RFID chips)
    • When reader within range, RFID chip responds with stored information
    • Privacy concerns due to “invisible” nature of the transmission of data
  14. How is Software Developed?
    • Custom Software – software applications that are developed within an organization for use by that organization
    • Commercial Off-the-shelf (COTS) Software – software that is developed by a software developer with the intention of selling the software in multiple copies
  15. What are Application Software Alternatives?
    • Purchase Commercial Off-The-Shelf Software
    • Application Service Providers – companies that own, operate, and maintain application software and the computer system resources required to offer the use of the application software for a fee as a service over the Internet
  16. Software Licensing
    • Purchasing the right to use specific software under the terms of the software licensing agreement
    • Protects the vendor’s intellectual property right
  17. What is System Software?
    System Management Programs – programs that manage the hardware, software, network, and data resources of computer systems during the execution of various information processing jobs of end users
  18. System Development Programs – programs that help users develop information system programs and procedures and prepare user programs for computer processing.
  19. What is an Operating System?
    • An integrated system of programs that:
    • Manages the operations of the CPU
    • Controls the input/output
    • Storage resources/activities
    • Provides various support services
    • Primary purpose is to:
    • Maximise productivity of a computer system
    • Minimise amount of human intervention required during processing
    • Assist application programs to perform common operations such as accessing a network, entering data, saving and retrieving files and printing or displaying output
  20. Popular Operating Systems
    • MS-DOS / Microsoft Windows
    • UNIX
    • Linux
    • Mac OS X
  21. Programs
    • Performance Monitors –monitor & adjust performance and usage of one or more computer systems to keep them running efficiently
    • Security Monitors –monitor & control use of computer systems and provide warning messages and record evidence of unauthorized use of computer resources
    • Application Servers - provides an interface between an operating system and application programs of users
    • Middleware –helps diverse software applications and networked computer systems exchange data and work together more efficiently
  22. What are the business benefits of adopting open- source software?
    • Cost: Open source software licenses are free.
    • Functionality: Developers around the world work continually to improve the software's features.
    • Time: Open source software users can quickly identify bugs and developers can quickly fix this bugs – often before these problems become widely known.
    • However, there exists a significant difference between licensing costs (free) and total cost of ownership (TCO). TCO includes installation, user training, and maintenance. In fact, licensing costs represent a very small percentage of overall costs.
    • Organizations adopting open-source applications need to monitor, evaluate, and implement fixes and enhancements to open source software. Implementing these changes may become tricky if the organization has modified the software to meet internal needs.
  23. What are the risks associates with open-source software?
    • How can these risks be addressed?
    • An open-source application may lose popularity and, therefore, community support. In short, all the "free" maintenance and upgrades might trickle to a halt.
    • "Free" software comes with a few catches. Eg, organizations that use and adapt open source software to meet new business needs are commonly prohibited from repackaging and selling this code. What starts as open source must remain open source, and pulling apart open-source code from custom code is no simple matter. The thought of "free" software may cloud purchasing manager's judgment. He should consider the TCO when evaluating a package. However, a business manager may fail to appreciate the long-term cost savings a commercial package might have over a free package.
    • Security remains one of the most commonly cited risks associated with open-source software but this is not a major problem. While it is true that a programmer could insert malicious code into an otherwise useful application, where would they release it? If the programmer releases this application through an active developer forum, other programmers would quickly spot and fix the problem. If an organization acquires its open-source software through some back-water channel, well, that's just plain careless.
  24. What are the four levels of programming languages
    • Machine Language:
    • All program instructions written in binary codes unique to each computer.
    • Programmers knowledgeable of internal operations of the specific type of CPU.
    • Assembler Language:
    • Alphabetic abbreviations/symbols used to represent operation codes & storage locations.
    • High Level Language:
    • Instructions use brief statements or arithmetic expressions.
    • Each statement generates several machine instructions when translated by compilers or interpreters.
    • Fourth Generation Language:
    • Nonprocedural – programmers specify results while computer determines sequence of instructions to accomplish those results.
    • Natural Language – very close to human language.
  25. Object-Oriented Languages
    • Ties together data element and the procedures or actions that will be performed upon them
    • Examples are Visual Basic, Turbo C++, C++, Object C++, and Java.
    • Advantages include:
    • OOP languages are easier to use and more efficient for programming GUI required by many applications
    • Programmed objects are reusable
  26. Web Languages & Services
    • HTML – a page description language that creates hypertext or hypermedia documents
    • XML – describes the contents of Web pages by applying identifying tags or contextual labels to the data in Web documents
    • Java – an object-oriented programming language that is simple, secure and platform independent
  27. Language Translators
    • Assembler – translates symbolic instruction codes of programs written in an assembler language into machine language instructions
    • Compiler – translates high-level language statements
    • Interpreter – compiler that translates & executes each statement in a program one at a time
  28. Programming Tools
    • Graphical Programming Interfaces
    • Programming Editors
    • Debuggers
    • CASE tools
  29. Definition of Data Resource Management
    A managerial activity that applies information systems technologies to the task of managing an organization’s data resources to meet the information needs of their business stakeholders
  30. Definition of Traditional File Processing
    Data are organized, stored, and processed in independent files of data records
  31. Problems of File Processing
    • Data Redundancy – duplicate data requires an update to be made to all files storing that data
    • Lack of Data Integration – data stored in separate files require special programs for output making ad hoc reporting difficult
    • Data Dependence – programs must include information about how the data is stored so a change in storage format requires a change in programs
    • Other Problems
  32. Definition of Database Management Approach
    • Consolidates data records into one database that can be accessed by many different application programs.
    • Software interface between users and databases
    • Data definition is stored once, separately from application programs
  33. Definition of Database Management Software (DBMS)
    Software that controls the creation, maintenance, and use of databases.
  34. Database Development
    • Most personal/SME databases use COTS packages like Microsoft Access, etc…
    • Large enterprise-wide database and its development are controlled by Database Administrators (DBA) Data definition language (DDL) are used by DBA to determine:
    • What data definition to be included
    • What structure/relationships among the data elements
    • Above info. Is catalogued/stored in DDL called Data dictionary – a catalog or directory containing metadata
    • Metadata – data about data
    • Some data dictionaries enforce standard data element definitions for end users and application programs
  35. Definition of Database Interrogation
    • Capability of a DBMS to report information from the database in response to end users’ requests
    • Query Language – allows easy, immediate access to ad hoc data requests
    • Report Generator - allows quick, easy specification of a report format for information users have requested
  36. Definition of Database Maintenance
    • Updating a database continually to reflect new business transactions and other events
    • Updating a database to correct data and ensure accuracy of the data
  37. Types of Databases
    • Operational – store detailed data needed to support the business processes and operations of a company
    • Distributed – databases that are replicated and distributed in whole or in part to network servers at a variety of sites
    • External – contain a wealth of information available from commercial online services and from many sources on the World Wide Web
    • Hypermedia – consist of hyperlinked pages of multimedia
  38. Definition Data Warehouse System
    Large database that stores data that have been extracted from the various operational, external, and other databases of an organization
  39. Definition of Data Mart
    Databases that hold subsets of data from a data warehouse that focus on specific aspects of a company, such as a department or a business process
  40. Definition of Data Mining: Analyzing the data in a data warehouse to reveal hidden patterns and trends in historical business activity
    • Perform “market-basket analysis” to identify new product bundles.
    • Find root causes to quality or manufacturing problems.
    • Prevent customer attrition and acquire new customers.
    • Cross-sell to existing customers.
    • Profile customers with more accuracy.
    • 2 - 50
  41. ----------------------- Page 51-----------------------
  42. Section 2C
    • Section 2C
    • or Chapter 6
    • or Chapter 6
  43. Telecommunications
    Management
  44. ----------------------- Page 52-----------------------
  45. Learning Objectives
    Learning Objectives
  46. 1. Understand what networked enterprise is about and
    • that the Internet, Intranet, and Extranet comprise its
    • foundation technology platform
    • 2. Provide examples of the business value of Internet,
    • intranet, and extranet applications.
    • 3. Understand the basic Telecommunications Network
    • model
    • 4. Identify alternative technologies available for each of
    • the 5 components of the basic telecommunications
    • network model and and understand their
    • characteristics from a business decision making
    • perspective
    • 5. Explain the functions of major types of
    • telecommunications network hardware, software,
    • media, and services.
  47. 2 - 52
  48. ----------------------- Page 53-----------------------
  49. The Networked Enterprise
    The Networked Enterprise
  50. Definition of Telecommunications : Exchange of information in any form
    (voice, data, text, images, audio, video) over networks
  51. When computers are networked, 2 industries
    • (computing and communications) converge, and
    • the result is vastly more than the sum of the
    • parts.
    • As a result, computing applications become
    • available for business-to-business coordination
    • and commerce, and for small as well as large
    • organizations to:
    • Collaborate more creatively
    • Manage their business operations and organizational
    • resources more effectively
    • Compete successfully in today’s fast-changing global
    • economy
    • 2 - 53
  52. ----------------------- Page 54-----------------------
  53. Networking the Enterprise (Interneted)
    Networking the Enterprise (Interneted)
  54. Providing customer
    • Cross-functional business
    • and vendor support
    • applications, etc.
  55. Collaboration
    • among business e-Commerce Cross-functional business
    • partners & CRM applications, etc.
  56. Figure 6.6
    2 - 54
  57. ----------------------- Page 55-----------------------
  58. More Definitions
    More Definitions
  59. Definition of Connectivity :
    • Ability of networked computers & other devices to easily
    • access and communicate with each other and share
    • information
    • Definition of Interoperability :
    • Ability of an open system to enable many different
    • applications of end users to be accomplished using
    • different varieties of computer systems, software
    • packages, and databases provided by a variety of
    • interconnected networks
    • Definition of Digital Network Technologies :
    • Digital transmission technologies that transmit
    • information in the form of discrete pulses for higher
    • transmission speeds, movement of larger amounts of
    • information, greater economy & lower error rates.
  60. 2 - 55
  61. ----------------------- Page 56-----------------------
  62. Trends in Telecommunications
    Trends in Telecommunications
  63. Figure 6.2
  64. 2 - 56
  65. ----------------------- Page 57-----------------------
  66. Business Value of
    • Business Value of
    • Telecommunications
    • Telecommunications
  67. Figure 6.4
    2 - 57
  68. ----------------------- Page 58-----------------------
  69. Internet and Its Applications
    Internet and Its Applications
  70. Definition of Internet: A network made up of millions of smaller private
    • networks each with ability to operate independent of, or in harmony with, all
    • the other millions of networks, all connected together
  71. Figure 6.5 2 - 58
  72. ----------------------- Page 59-----------------------
  73. Business Value of the Internet
    Business Value of the Internet
  74. Possible cost savings
    • because applications that
    • use Internet, intranets
    • and/or extranets are less
    • expensive to develop,
    • operate, and maintain
    • than traditional systems.
    • Attract new customers
    • with innovative marketing
    • and product offerings.
    • Retaining present
    • customers with improved
    • customer service and
    • support.
    • Generating revenue
    • through eCommerce Figure 6.7
    • applications.
  75. 2 - 59
  76. ----------------------- Page 60-----------------------
  77. Intranet & its Business Value
    Intranet & its Business Value
  78. Definition: A network inside an organization that uses Internet technologies to
    • provide an Internet-like environment within the enterprise for information sharing,
    • communications, collaboration, and the support of business processes
  79. Figure 6.8
  80. 2 - 60
  81. ----------------------- Page 61-----------------------
  82. Business Value of Extranets
    Business Value of Extranets
  83. Definition: Network links that use Internet technologies to
    • interconnect the intranet of a business with the intranets of its
    • customers, suppliers, or other business partners
  84. Figure 6.9
  85. 2 - 61
  86. ----------------------- Page 62-----------------------
  87. Telecommunications Network
    • Telecommunications Network
    • Components
    • Components
    • Terminals – any input/output device that uses
    • telecommunications networks to transmit or receive data
    • Telecommunications Processors– devices that perform
    • control and support functions
    • Telecommunications Channels & Media – media over which
    • data are transmitted and received
    • Computers – all sizes and types (refer section 2A)
    • Telecommunications Control Software – programs that control
    • telecommunications activities
  88. Figure 6.12
    2 - 62
  89. ----------------------- Page 63-----------------------
  90. Telecoms Components &
    • Telecoms Components &
    • Alternatives
    • Alternatives
  91. Figure 6.11
    Figure 6.11 Key telecommunications components and alternatives. 2 - 63
  92. ----------------------- Page 64-----------------------
  93. Types of Telecommunications
    • Types of Telecommunications
    • Networks
    • Networks
    • Wide Area Network (WAN) – network that covers a large
    • geographic area
    • Local Area Network (LAN) – network connecting
    • information processing devices within a limited physical
    • area
    • Virtual Private Network (VPN) – secure network that uses
    • the Internet as its main backbone network, but relies on
    • network firewalls, encryption, and other security features of
    • its Internet and intranet connections and those of
    • participating organizations
    • Client/Server – PCs and workstations, called clients are
    • interconnected by local area networks and share
    • application processing with network servers
    • Network Computing – Thin clients provide a browser-based
    • user interface for processing small application programs
    • Peer-to-Peer – file-sharing software connects each PC to a
    • central server or to another online user’s PC
  94. 2 - 64
  95. ----------------------- Page 65-----------------------
  96. Wireless Technologies
    Wireless Technologies
  97. Cellular and PCS Systems – a geographic area
    • divided into cells with one low-power transmitter
    • device per cell used to relay calls from one cell
    • to another
    • Wireless LANs –high- or low-frequency radio
    • technology installed in an office or building
    • (infrared included)
    • Wireless Web – wireless, Web-enabled
    • information appliances accessing the Internet,
    • intranets and extranets. Encourage use of :
    • PDA, smart phones which are very thin clients
    • Wireless Application Protocol (WAP) for web services
    • 3G wireless technologies for better speed & apps
  98. 2 - 65
  99. ----------------------- Page 66-----------------------
  100. Telecoms Processors/Technologies
    Telecoms Processors/Technologies
  101.  Modems – convert digital
    • signals from a computer into
    • analog frequencies that can be
    • transmitted over ordinary
    • telephone lines
    •  Multiplexers – allows a single
    • communications channel to
    • carry simultaneous data
    • transmissions from many
    • terminals
    •  Switch – makes connections
    • between telecommunications
    • circuits in a network
    •  Router – intelligent
    • communications processor that
    • interconnects networks based
    • on different protocols
    • Figure 6.22
    • Hub – a port switching communications processor
    • Gateway – connects networks using different communications architectures
  102. 2 - 66
  103. ----------------------- Page 67-----------------------
  104. Communications Processors
    Communications Processors
  105. Figure 6.21
    2 - 67
  106. ----------------------- Page 68-----------------------
  107. Network Architectures & Protocols
    Network Architectures & Protocols
  108. Protocol – standard set of rules and
    • procedures for the control of
    • communications in a network
    • Network Architecture – the use of standard
    • protocols, standard communications
    • hardware and software interfaces and the
    • design of a standard multilevel interface
    • between end users and computer systems
    • with the goal of promoting an open,
    • simple, flexible, and efficient
    • telecommunications environment
    • 2 - 68
  109. ----------------------- Page 69-----------------------
  110. OSI & TCP/IP Models
    OSI & TCP/IP Models
  111. Transmission Control Protocol
    (TCP)/ Internet Protocol (IP) Open System Interconnection (OSI)
  112. Figure 6.25
    2 - 69
  113. ----------------------- Page 70-----------------------
  114. Transmission Speeds
    Transmission Speeds
  115. Figure 6.26
  116. 2 - 70
  117. ----------------------- Page 71-----------------------
  118. Network Management
    • Network Management
    • (Telecoms Control Software)
    • (Telecoms Control Software)
    • Traffic Management – manage network
    • resources and traffic to avoid congestion and
    • optimize telecomss service levels to users
    • Security – provide authentication, encryption,
    • firewall, auditing and enforcement
    • Network Monitoring – troubleshoot and watch
    • over the network, informing network
    • administrators of potential problems before they
    • occur
    • Capacity Planning – survey network resources
    • and traffic patterns and users’ needs to
    • determine how best to accommodate the needs
    • of the network as it grows and changes
  119. 2 - 71

What would you like to do?

Home > Flashcards > Print Preview