Podcast
Questions and Answers
Which skill cluster is LEAST emphasized in high-growth professions outside of Data, AI, Engineering, and Cloud Computing?
Which skill cluster is LEAST emphasized in high-growth professions outside of Data, AI, Engineering, and Cloud Computing?
- Tech Disruptive Skills (correct)
- Business Skills
- Specialized Industry Skills
- Tech Baseline Skills
In the context of information systems, which accurately describes knowledge
?
In the context of information systems, which accurately describes knowledge
?
- Data that has been recorded but not organized to convey a specific meaning.
- Data and/or information organized and processed to convey understanding applicable to a current business problem. (correct)
- Data organized to have meaning and value to the recipient.
- Elementary descriptions of events and activities.
Which scenario best demonstrates the business practice of outsourcing
?
Which scenario best demonstrates the business practice of outsourcing
?
- A company hires a local firm to manage its employee healthcare benefits. (correct)
- A company develops a new software product in-house using its existing IT department.
- A company purchases new computer hardware to upgrade its existing IT infrastructure.
- A company relocates its customer service department to a developing nation to save on labor costs.
What is the primary difference between outsourcing
and offshoring
?
What is the primary difference between outsourcing
and offshoring
?
According to Porter's Five Forces model, what condition indicates a HIGH bargaining power of suppliers?
According to Porter's Five Forces model, what condition indicates a HIGH bargaining power of suppliers?
How does the internet typically affect the threat of new entrants in an industry, according to Porter's Competitive Forces Model?
How does the internet typically affect the threat of new entrants in an industry, according to Porter's Competitive Forces Model?
Which activity is considered a support activity in Porter's Value Chain Model?
Which activity is considered a support activity in Porter's Value Chain Model?
What is the primary distinction between traditional and new IS functions regarding non-IS (non-information systems) managers?
What is the primary distinction between traditional and new IS functions regarding non-IS (non-information systems) managers?
Which of the following is NOT a difficulty in managing data effectively?
Which of the following is NOT a difficulty in managing data effectively?
Which of the following accurately describes the concept of data independence
within the database approach?
Which of the following accurately describes the concept of data independence
within the database approach?
In the context of database terminology, what is the significance of a primary key
?
In the context of database terminology, what is the significance of a primary key
?
In entity-relationship (ER) modeling, what distinguishes an entity instance from an entity class?
In entity-relationship (ER) modeling, what distinguishes an entity instance from an entity class?
What is the primary role of Online Analytical Processing (OLAP) in data warehousing?
What is the primary role of Online Analytical Processing (OLAP) in data warehousing?
What is the key difference between data mining and Business Intelligence (BI) applications regarding their predictive capabilities?
What is the key difference between data mining and Business Intelligence (BI) applications regarding their predictive capabilities?
In the context of knowledge management, what is the main challenge in dealing with tacit knowledge
?
In the context of knowledge management, what is the main challenge in dealing with tacit knowledge
?
What best describes the primary function of the Central Processing Unit's (CPU) control unit?
What best describes the primary function of the Central Processing Unit's (CPU) control unit?
Which of the following statements accurately compares RAM and ROM?
Which of the following statements accurately compares RAM and ROM?
What factor primarily differentiates secondary storage from primary storage?
What factor primarily differentiates secondary storage from primary storage?
In the context of enterprise storage systems, what is a defining characteristic of a Storage Area Network (SAN)?
In the context of enterprise storage systems, what is a defining characteristic of a Storage Area Network (SAN)?
What is a key security risk associated with Bring Your Own Device (BYOD) policies?
What is a key security risk associated with Bring Your Own Device (BYOD) policies?
What describes the role of systems software
?
What describes the role of systems software
?
What element is most consistent of cloud computing's defining features?
What element is most consistent of cloud computing's defining features?
What statement is correct relating to open-source software
?
What statement is correct relating to open-source software
?
Which scenario best illustrates the concept of a 'silo culture' within a functional organization?
Which scenario best illustrates the concept of a 'silo culture' within a functional organization?
In Business Process Management (BPM), what constitutes a management process
?
In Business Process Management (BPM), what constitutes a management process
?
Which factor would be LEAST critical or effective for successful Business Process Management (BPM)?
Which factor would be LEAST critical or effective for successful Business Process Management (BPM)?
What is a key technical difference between a LAN and a WAN?
What is a key technical difference between a LAN and a WAN?
Which of the following is a challenge associated with e-learning?
Which of the following is a challenge associated with e-learning?
Which of the following best describes 'e-business' in contrast to 'e-commerce'?
Which of the following best describes 'e-business' in contrast to 'e-commerce'?
How has electronic commerce impacted the levels of digitization?
How has electronic commerce impacted the levels of digitization?
What describes the 'long tail' business strategy?
What describes the 'long tail' business strategy?
What is disintermediation within online service industries?
What is disintermediation within online service industries?
What is the defining characteristic of unstructured decisions?
What is the defining characteristic of unstructured decisions?
Which analysis is represented as a 'backward' solution?
Which analysis is represented as a 'backward' solution?
What describes the impact caused by a 'logic bomb' software attack?
What describes the impact caused by a 'logic bomb' software attack?
Flashcards
Homo Conexus
Homo Conexus
Connected humans who practice continuous computing and are surrounded by movable information networks.
Information System (IS)
Information System (IS)
An organized system for the collection, organization, storage, and communication of information.
Application Program
Application Program
A computer program designed to support a specific task or business process.
Data
Data
Signup and view all the flashcards
Information
Information
Signup and view all the flashcards
Knowledge
Knowledge
Signup and view all the flashcards
Computer-Based Information System (CBIS)
Computer-Based Information System (CBIS)
Signup and view all the flashcards
Hardware
Hardware
Signup and view all the flashcards
Software
Software
Signup and view all the flashcards
Database
Database
Signup and view all the flashcards
Network
Network
Signup and view all the flashcards
Procedures
Procedures
Signup and view all the flashcards
People
People
Signup and view all the flashcards
Open-Source
Open-Source
Signup and view all the flashcards
Outsourcing
Outsourcing
Signup and view all the flashcards
Offshoring
Offshoring
Signup and view all the flashcards
Business Pressures
Business Pressures
Signup and view all the flashcards
Functional Area Information Systems (FAIS)
Functional Area Information Systems (FAIS)
Signup and view all the flashcards
Enterprise Resource Planning (ERP) systems
Enterprise Resource Planning (ERP) systems
Signup and view all the flashcards
Transaction Processing System (TPS)
Transaction Processing System (TPS)
Signup and view all the flashcards
Inter-organizational information systems (IOSs)
Inter-organizational information systems (IOSs)
Signup and view all the flashcards
Competitive Advantage
Competitive Advantage
Signup and view all the flashcards
Strategic Information Systems (SISs)
Strategic Information Systems (SISs)
Signup and view all the flashcards
Porter's Competitive Forces Model
Porter's Competitive Forces Model
Signup and view all the flashcards
Value Chain
Value Chain
Signup and view all the flashcards
Shadow IT
Shadow IT
Signup and view all the flashcards
Database Management System (DBMS)
Database Management System (DBMS)
Signup and view all the flashcards
Data File
Data File
Signup and view all the flashcards
Data Redundancy
Data Redundancy
Signup and view all the flashcards
Data Isolation
Data Isolation
Signup and view all the flashcards
Data Inconsistency
Data Inconsistency
Signup and view all the flashcards
Data Security
Data Security
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Data Independence
Data Independence
Signup and view all the flashcards
Data Model
Data Model
Signup and view all the flashcards
Study Notes
Professions of the Future
- Growth in future professions is driven by both digital and human factors.
- Emerging professions reflect the adoption of new technologies, increasing demand for:
- Green economy jobs
- Data and AI
- Engineering
- Cloud computing and product development
- Emerging professions reflect the importance of human interaction, creating demand for:
- Care economy roles
- Marketing, sales, and content production
- People and culture roles
- The future requires skills that match the professional opportunities inclusive of technical, industry and and core business skills.
- There are seven emerging professional clusters and 96 diverse jobs, with varying individual growth rates and opportunity scales.
- The featured professional clusters were estimated to represent 506 out of 10,000 jobs in 2020, rising to 611 out of 10,000 by 2022.
- Across all profession clusters, the highest-growth jobs include:
- Artificial Intelligence Specialists
- Medical Transcriptionists
- Data Scientists
- Customer Success Specialists
- Full Stack Engineers
- Across all profession clusters, lower-volume jobs with highest growth are:
- Landfill Biogas Generation System Technicians
- Social Media Assistants
- Wind Turbine Service Technicians
- Green Marketers
- Growth Hackers
- Emerging professional clusters require both technical and cross-functional skills, increasing the value of distinctive skill sets
- These in-demand skills are divided into five clusters:
- Business Skills
- Specialized Industry Skills
- General and Soft Skills
- Tech Baseline Skills
- Tech Disruptive Skills
- While data, AI, engineering, and cloud computing need digital expertise, some high-growth professions emphasize business or specialized industry skills.
- Homo Conexus refers to connected humans who practice continuous computing and are surrounded by a personal, mobile information network.
Information Systems (IS)
- An IS is an organized system collecting, organizing, storing, and communicating information.
- An application program is designed to support a specific task, business process or other application.
- Data constitutes recorded and classified elementary descriptions lacking specific meaning.
- Information is organized data providing meaning and value to the recipient.
- Knowledge is organized and processed data conveying understanding, experience, and expertise.
- A CBIS is an IS that uses computer technology, and most ISs today are computerized.
- Hardware consists of devices accepting, processing, and displaying data and information.
- Software is a program or collection of programs enabling hardware to process data.
- A database is a collection of related files and tables.
- A network is a connecting system for sharing resources among computers.
- Procedures are instructions combining components to process information and generate output.
- People are those who use the hardware and software to interface or utilize it's output.
- Open-source software has freely available source code that can be redirected and modified.
- Outsourcing is hiring an outside party to perform services traditionally done by a company's employees, offering:
- Good value
- Experience
- English language skills
- Culture fit
- Outsourcing also has disadvantages like:
- Attrition
- Difficulty finding experienced workers
- Communication
- Quality
- Trip related issues
- Offshoring relocates business operations to a different country with cheaper labor/resources.
- Industry 1.0: Mechanical weaving loom using water and steam power.
- Industry 2.0: First production line, mass production with electrical energy.
- Industry 3.0: Programmable logic controller (PLC) that uses electronics and IT for automation
- Industry 4.0: Cyber-physical systems link real objects with information/virtual networks.
Business Pressures
- The business environment is a combination of social, legal, economic, physical, and political factors in which businesses operate.
- Changes can create business pressures on organizations who respond with IT-supported activities.
- Market pressures are generated by the global economy
- Market pressures are generated by intense competition
- Market pressures are generated by the changing workforce
- Market pressures are generated by powerful, knowledgeable customers.
- Technological pressures include rapid innovation replaced by obsolescence, and information overload.
- Internet brings a flood of information to managers who must be able to efficiently make decisions.
- Societal, political, and legal pressures include ethics and responsibility, and government regulation.
- Functional Area Information Systems (FAISs) are supporting pillars for information systems like business intelligence systems and dashboards.
- Enterprise resource planning (ERP) systems designed to correct to a lack of communication among the FAISs.
- Transaction processing system (TPS) supports the monitoring, collection, storage, and processing from organization's basic business transaction.
- Inter-organizational information systems (IOSs) connect two or more organizations and support supply chain management.
Competitive Advantage and Strategic Systems
- Competitive advantage happens when an organization has attributes allowing it to outperform competitors.
- Strategic ISs gives a competitive advantage by implementing goals and improving performance.
Porter's Competitive Forces Model
- Porter's model analyzes competitiveness, identifying five forces endangering or enhancing a company's position:
- Threat of new competitors
- Bargaining power of suppliers
- Bargaining power of customers
- Threat of substitute products/services
- Rivalry among existing firms
- Threat of new competitors is high when entry is easy and low when entry barriers exist.
- The Internet generally increases the threat of new competitors.
- Supplier power is high when buyers have few choices and low when buyers have many.
- Internet impact is mixed, as buyers can find alternatives while suppliers integrate for customer lock-in.
- Buyer power is high when buyers have many choices and low when buyers have few.
- Internet increases buyer power with access to information and reduced switching costs.
- The threat of substitutes is high when many substitutes exist and low when few exist.
- Information-based industries are at a greater risk from substitutes.
- Rivalry among firms in an industry is high when there is fierce competition, and low when competition is not.
Porter's Value Chain Model
- A value chain is a sequence of activities transforming inputs into more valuable outputs.
- The model identifies specific activities where organizations can get the greatest strategic impact.
- Primary activities create value customers are willing to pay for, like production or distribution.
- Support activities contribute to competitive advantage by supporting primary activities.
Managing Information Resources
- IT reduces middle managers, changes the manager's job, it affects employees, and improves quality of life.
- IS management is difficult where computers exist in all departments making division of responsibility very difficult.
- The division depends on factors like organization size/nature, IT work, attitudes, technology maturity, and outsourcing.
- IS departments ensure employee access to computer systems.
- Shadow IT is using IT systems, software, and services without explicit IT department approval, introducing security risk.
- End-user support includes a help desk staffed with IS personnel who help users troubleshoot problems.
- Business managers should participate in IS decisions to manage it as a critical resource and catalyze change.
- IS is central to integrated, Internet-based solutions replacing standard processes.
- IS can enable or inhibit business opportunities and combat challenges.
- IS allows customers to voice concerns, supports data-driven decisions, and ensures asset security.
- The traditional IS functions are:
- Managing systems development and project management
- Managing computer operations
- Staffing, training, and developing IS skills
- Providing technical services
- Infrastructure planning, development, and control
- The new IS functions are:
- Initiating and designing strategic systems
- Incorporating the Internet and e-commerce within the business.
- Managing system integration
- Educating non-IS managers about IT
- Educating IS staff about the business
- Supporting end-user computing
- Partnering with executives
- Managing outsourcing
- Innovating
- Aligning with vendors and IS departments
- Improving business processes
Database Management
- Common data sources include credit cards, emails, RFID tags, video surveillance, radiology scans, and blogs.
- IT applications needs data, which should be high quality: accurate, complete, accessinle, concise etc.
- Data management is increasingly difficult due to the exponential increase of data.
Difficulties of Managing Data
- exponentially increasing amount of data.
- Data scattered by many individuals who use various methods and devices.
- Having data coming from many sources.
- Maintaining data security, quality, and integrity .
- Increasing amount of data needs consideration for organizational decisions.
- Database Management Systems (DBMS) provide users with access to data and minimize redundancy, isolation, and inconsistency, while maximizing security, integrity, and independence.
- A data file is a collection of logically related records.
- Data redundancy: same data are stored in many places
- Data isolation: applications cannot access data associated with other apps
- Data inconsistency: various data copies do not agree
- Data security: data must be kept safe from theft, modification, and destruction
- Data intergrity: data must meet constraints
- Data independence: applications and data are independent
- Bit is the smallest unit, a binary digit (0 or 1).
- A byte represents a single character.
- A field is a group of logically related characters.
- A record is a group of logically related fields.
- A file is a group of logically related records.
- A database is a group of logically related files.
Designing the database
- Data must be structured so users can properly retrieve, analyze, and understand
- Data model diagram represents entities with their relations.
- An entity is customer, employee, or product about which data is maintained.
- An instance of an entity is one specific entity, like a particular student.
- Attributes describe quality of the particular entity, like employee number.
- The primary key uniquely identifies a record; a student record can be the unique student number.
- The primary key is stable, minimal, factless, definitive, accessible, and unique.
- The secondary (foreign) key is the other field that assists identification, but does not identify an entry with complete accuracy, like a student's major.
- ER diagrams in entity-relationship (ER) modeling, consist of entities, attributes and relationships.
- Entities are pictured in boxes, and relationships are represented as diamonds.
- Attributes must be listed, and the primary key is underlined.
- Entity classes are groups of entities with certain characteristics.
- An instance of an entity class represents certain entity.
- Entity instances have identifiers that are unique to that entity instance.
- A DBMS provides add, delete, access and analyze data tools.
- The relational database model uses two-dimensional tables where each one has records and attributes.
- Structured query language (SQL) has statements for complex searching.
- Data are house in a historical repository organized by the subject to support decision makers.
- Data in warehouses are organized by the subject, are historical, use online analytical processing, and are multidimensional.
- Historical data trends, forecasts, and timeline comparisons via use of data warehouses.
Online analytical processing (OLAP)
- Involves analyzing accumulated data by end users in a data warehouse.
- Data from business transactions are processed online as soon as they occur in online transaction processing, (OLTP)
- Data cubes have three dimensions: customer, product, and time.
- Benefits of data warehouses include data accessibility, extensive analysis, and a comprehensive view of data.
- Data marts are small warehouses for end-user needs and have local, not central, control.
- Data mining, valuable search for business information, can perform these operations:
- Predicting trends and behaviors
- Identify previously unknown patterns
- Business intelligence (BI) applications have users with views of happenings, but automates process of finding predictive information in large databases.
- The data mining can use mailings to identify those prospects that are likely to respond favorably to future mailings, which is also used to forecast bankruptcy.
- Data governance manages data across an organization, and master data management is method for governance.
- Master data contains information about customers, products, and vendors.
- Knowledge, in knowledge management, is in an unstructured format and is easy to exchange among people so they are able to grow.
- Information in action is contextual, relevant, and actionable.
- Intellectual capital is other term for knowledge.
Types of knowledge
- Explicit: objective, rational, technical, and documented
- Tacit: cumulative, subjective, experiential, imprecise costly to transfer, and personal
Knowledge management systems (KMS)
- They systemize, enhance and expedite knowledge.
KMS benefits
- Intended to help cope with turnover, change, and downsizing.
- Best practices can be readily available to many employees.
Steps of KMS Cycle
- Create: Determine new ways of actions with external sources.
- Capture: Identify new source as valuable.
- Refine: Set new knowledge in an actionable context.
- Store: Preserve knowledge in a knowledge repository.
- Manage: Keep the knowledge up to date.
- Disseminate: Make the knowledge accessible regardless of the time.
Hardware
- Is physical equipment involving the input, processing, output and storage activities.
Hardware components
- Central processing unit (CPU). It manipulates data and controls tasks.
- Primary storage. Temporarily stores data during processing.
- Secondary storage. Stores data for later use.
- Input technologies. Accept converts for computer to read.
- Output technologies. Present data for people to understand.
- Communication technologies. Provides data flow between computer networks and CPU.
Central Processing Unit (CPU)
- Conducts actual computation inside computer in a microprocessor.
- Consists of control and artithmetic-logic unit (ALU).
- Control accesses and decodes program instructions.
- ALU performs math calculations.
- Registers store small amounts of data for periods.
- Inputs are stored then retrieved and processed or read from data from the user.
- Data travles via the buses.
- The control unit directs data flow within the chip.
- ALU receives translated data which is computed inside the chip.
Types of Computer Memory
- “Primary" amount of memory to be used immediately.
- “Secondary”, more amount of data and info that can be used for years.
- Computers can use only 0s and 1s which are then translated into bits.
- Bits are combined to form alphanumeric and operations.
- An 8-bit string, represents as one byte. -Storage is measured in bytes, megabytes which translates from one million of bytes which increases to:
- Gigabyte and terabyte.
- Petabyte and exabyte.
- Zettabyte for units that goes above. Primary storage or main memory holds the data to be processed along with instruction.
- It then manages the operation via the motherboard
- Four main types is the register, cache, RAM and ROM:
- Registers have capacity with short-term data.
- Cache uses high speed temporarily.
- Random access memory (RAM) stores that then sent to teh registered. Compared to registers, RAM is smaller and farther. -It however uses less storage compared secondary unit.
- Read-Only memory (ROM) is used primarily for start up and cant be changed.
- Secondary storage uses input output channels.
- Secondary doesn't retain and is cheaper than primary storage. -The speed is significantly slower than primary storage
- Examples of include USB, disk drives etc. -Enterprise storage can be indpendenent.
Bring-Your-Own-Device (BYOD)
- Employees has own divices that connect to secure corporate network.
Positive and negative advantages of personal connections
- It can lower cost and give more customer service, engagement and trust. Though negatively can also come with higher security issues, and loss.
- MDM is used often with BYOD system.
Input and outputs
- Allows people to enter infor via human and source data via entering data via human and then input via keyboards and voice recognition. The output which then translates to monitors and printers and plotters.
- Software is how hardware can properly be effective via computer programs via writing called programmings.
- Computer Programs are inclusive with documentation that hel0 with programmers.
- Systems software serves intermediary between hardware and computer programs This leads create operating systems which include windows and linus which hides complexity The OS manages input and output and resources to manage all functions along security and graphical
Functions of operating system
- Multitasking
- virtual memory
- graphical user with many forms.
- This can apply to a certain thing called the coding to create improvise in applications for proprietary
- off the shell which include cloud
Clod computing
- This delivers on demand access including resources over intern to acquire when needed with advantages to provide these services:
- Provides resources
- Uses network Programming languages are what output to computers and most often used are C and Java. These are needed for the sake of experience but can bring risks. The defect with codes cause problems with dependence and licensing. Licenses help investment to protect against having to make copies which is illegal System contains open products via same operating system
KMS Cycle
- Offers cost effectiness and will run across the computers but issues still arise over ease, support for open source can also bring ease of use plus expense over needing to train users as well as compatability issues
- A software valuation is a form of assessment of software along improve Business process involve having a achieve result Input/output Resources and metrics to employ in the business via porter values from customer from operation which gives support.
Process
Involve multiple level in operations. So that managers avoid create with the good of the company which involved types of business process to support planning activities: Therefore modeling is more essential for performance: Business process which creates improve the advantage
Business process helps to manage improvement with better results with time, quality. Business support for these improvements can be done for proper performance which has several alignment factors
- the levels of investment
- employee specialization
- organizational changes
- employees training to help computer support.
Types of Computer Networks
- Can be understood in many way involving computer applications social and all computer communication.
- A system that has device for data is a local area network, where wide can has large access as well as the internet Internet - Protocol addresses which allows the websites find each other from an organization which is hard to recall so a DNS
Elearning
- Electronic learning leads to increase retention with convenience to have learning and less cost but also has instructors and multimedia.
- Face help increase engagement as it goes against social network.
- Which can happen the same support
Tele
Which the internet connects you
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.