MIS (Final Exam)
Card Set Information
MIS (Final Exam)
MIS Final Exam Cards
A combination of people, hardware, softeware, networks, and data resources.
It collects, transfroms, and disseminates information in an organization.
Information systems support what (3) things in Business?
1. Business processes and
2. Business decision making,
3. Strategic competitive advantage
Major categories of computer systems are?
– midrange computers,
– mainframe computers.
Computer systems consist of ? (2)
(1) Computers (CPU) (processing)
(2) Peripherals - input, output, and secondary data storage devices
What are the (2) Major IS categories ?
1. Operations Support Systems
– Transaction Processing Systems
– Process Control Systems
– Enterprise Collaboration Systems
2. Management Support Systems
– Management Information Systems (MIS)
–Decision Support Systems (DSS)
Executive Information Systems (EIS)
Electronic Business Systems consist of ?
1. Functional Business Systems
2. Enterprise (Cross-Functional) Business Systems
Functional Business Systems support what?
support traditional business functions and operations like
–Human resource management
What crosses the boundaries of traditional business functions:?
Enterprise (Cross-Functional) Business Systems
– Enterprise Resource Planning
– Customer Relationship Management
– Supply Chain Management
What controls the creation and use of databases?
Database management system (DBMS)
What supports communication,
coordination and collaboration?
• Collaboration System (Groupware)
is buying and selling of products, services, and information over the Internet and extranets.
What are (3) categories of E-commerce?
Information systems support
decisions for the
three levels of management
activity such as?
be specified at advance.
be specified at advance
What are (3) Management Support Systems?
. Traditional Management Information Systems (MIS) à reporting function - for structured
Decision Support Systems
- use analytical models (a model base)
- semistructured decisions
Executive Information Systems (EIS)
-provide strategic information for the needs of executives and
other decision makers
-some MIS and DSS features + more graphics.
What is a traditional form of reports,
Periodic Scheduled Reports
- a pre-specified format on a regular basis.
- weekly sales analysis reports, etc.
What type of report is generated when a specific set of conditions occur.
- when some process exceeds given parameters and requires management action.
What type of reports provide information whenever a manager demands it.
Demand Reports and Responses
What type of reports provides information that is pushed
to a manager’s networked PC?
- webcasting software selectively broadcasts reports over the company’s intranet.
Define,Online Analytical Processing
to analyze complex relationships among large amounts of data stored.
What are the Basic
- aggregation of data.
– (opposite to #1) -
displaying detailed data that comprises consolidated data
Slicing and Dicing
- looking at the
database from different viewpoints.
Define, Decision support system
interactive computer-based IS
that uses an analytical
model (a model base) to support
A ________ is a software component that consists of
models used in analytical and computational routines.
This is a science and technology based on disciplines such as computer science, biology, psychology,
linguistics, mathematics, and engineering.
What works to develop computer functions normally associated with
Artificial Intelligence (AI)
What are (3)
scientific areas of
1. Cognitive Science
3. Natural Interface
– Expert Systems
– Neural Networks
– Fuzzy Logic
– Genetic Algorithms
– Virtual Reality
– Intelligent Agents
What is a
IS that uses its knowledge about a
application area to act as an
consultant to end users?
Define, Neural Networks
•Computing systems modeled after the brain’s
mesh-like network of interconnected processing elements, called
This enables the network to
learn to recognize patterns
and relationships in the data it processes
What is a method of reasoning that allows for approximate values and inferences?
What simulate a Darwinian evolutionary process that yields increasingly
better solutions to a
• useful when thousands of solutions arepossible.
Componets of Virtual Reality (VR):
• is a computer-simulated reality
• virtual worlds - through sight, sound, and touch.
• uses special devices
: computer-aided design (CAD), medical diagnostics, flight simulators, video games.
___________ is a software surrogate that fulfills (accomplishes) specific tasks for end users. It •uses built-in and learned knowledge about how an end user behaves
What are (2) (IA) categories for business computing?
1. User Interface Agents
2. Information Management Agents
What are the (5) processes of Systems
Development Life Cycle
. Systems Investigation (
: Feasibility Study)
Systems Design (
Systems Implementation (
Systems Maintenance. (
___________is the rapid development and testing of working models (prototypes) of new applications in
iterative, interactive process with extensive end-user involvement.
Application development using prototyping - steps:
4.Use and Maintain the System.
Feasibility - major categories:
how well a proposed information system supports the
objectives of the organization.
whether suitable hardware and software can be
acquired or developed.
: whether the proposed IS benefits are greater than costs. - tangible and intangible costs and benefits
Human Factors Feasibility
Political /Legal Feasibility
Whic of the (SDLC) answers the questions:
–What are our opportunities?
–What are our priorities?
–Can IS be used to address our
Which of the (SDLC) answers the question:
•WHAT the system should do ?
HOW will the system accomplish
the objectives ?
1. User Interface Design.
2. Data Design.
3. Process Design
Reduction of user fear and resistance to change includes:
–Educating employees on the need for change.
–Training employees in core competencies.
–Developing ways to measure and reward performance.
–Analyzing the impact of changebefore committing it.
–Encouraging direct user involvement in organizational change and system development.
____________is the unauthorized use, access, modification, and destruction of information,
hardware, software or network resources, and the unauthorized release of information.
Categories of Computer Crimes
- unauthorized access and use of
2. Cyber Theft
- electronic breaking and
entering involving the theft of money.
3. Unauthorized Use
- unauthorized copying of software.
5. Computer Viruses and Worms
- spread destructive program routines that can result in destroying the contents of memory, hard disks, and
other storage devices
the goal - to design healthy work environments that are safe, comfortable, and pleasant for people to work in can be define as?
Security measures of the E-Business
-Denial of Service Defenses.
Levels of service in the case of a computer system failure:
1.Fail-Over Fault Tolerance.
processors, peripherals or software take over in the event of a system error.
2.Fail-Safe Fault Tolerance
systems continue to operate at the same level even if there is a major failure.
. Computer systems continue to operate at a reduced level.
____________ are methods and devices
that ensure the accuracy, validity, and propriety of IS activities.
• Input Controls.
• Processing Controls (Hardware and Software Controls)
- Fire walls.
• Output Controls.
• Storage Controls.
The purchase of goods or services from third-party partners that were previously
Relocation of an organization’s business processes to a lower-cost location, (usually overseas)