Chapter 11 - Study Guide PDF

Summary

This study guide covers information systems, big data, and data analytics, providing definitions and activities for understanding these concepts.

Full Transcript

**jCHAPTER 11 -- STUDY GUIDE** **Using Technology to Manage Information** *Instructions: Fill in the Study Guide as you read the chapter and in class.* **Data, Information Systems and Big Data** [What is data?] Data consist of raw facts and figures that may or may not be relevant to a business...

**jCHAPTER 11 -- STUDY GUIDE** **Using Technology to Manage Information** *Instructions: Fill in the Study Guide as you read the chapter and in class.* **Data, Information Systems and Big Data** [What is data?] Data consist of raw facts and figures that may or may not be relevant to a business decision [What is information?] Information is knowledge gained from processing those facts and figures. [Where do we get data?] Data can come from many sources, including people, machines, an technology [What is big data?] Large or complex structured or unstructured sets of information that traditional processing Applications are unable to analyze. [What is an information system?] An organized method for collecting, storing, and communicating past, present, and projected Information on internal operations and external intelligence [How do businesses use data to solve problems?] Business needs to gather data about the demographics of a target market or the specifications of a Certain product [What are data analytics?] Data analytics is the science of analyzing raw data in order to make conclusions about that Information. Data analytics can shape business processes, improve decision making, and foster Business growth [How does data create value for a company?] By improving decision making, reducing costs, better customer experiences, increased operational efficiency **Activity -- Big Data** Using the data sets, answer the following questions? 1. You are StreamNow; what patterns do you notice in your user behaviour? 2. You are BuyOnline; which types of users are spending the most money on your site? 3. You are BestAnalytics; what insights can you offer to StreamNow to help them improve their services? 4. You are BestAnalytics; what insights can you offer to BuyOnline to help them increase their number of premium customers? 5. Do you have any concerns with how the data is being used? Consider: a. Which of the data sets would you be happy for your data to be included in? b. Are you comfortable with the way the data was used? c. What rules do you think there should be to regulate how data is analysed? **Information Systems** [What is a database?] A database is a centralized, integrated collection of data resources [Two types of information systems (list and describe each):] 1\. **Operational support systems** is an information system designed to produce a variety of information on an organization's activities for both internal and external users 2\. **Management support systems** is an information system that is designed to provide support for effective decision making. Four types of management support systems (list and describe each): 1\. **Management information system** is an information system that is designed to produce reports for managers and others with the organization 2\. **Decision support system** is a system that gives direct support to businesspeople during the decision-making process 3\. **Executive support system** is a system that lets senior executives access the company's primary databases, often by touching a computer screen, pointing and clicking a mouse, or using voice recognition 4\. **Expert systems** is a computer program that imitates human thinking through complex sets of if/then rules **Computer Hardware and Software** [What is hardware?] Hardware consists of all tangible elements of a computer system [What is computer software?] Computer software are all the programs, routines, and computer languages that control a computer and tell it how to operate **Networks, the Internet and Cloud Computing** [What is a LAN?] Local Area Networks is a computer network that connects machines within limited areas, such as a building or several nearby buildings [What is a WAN?] Wide Area Networks is a network that ties larger geographical regions together by using telephone lines and microwave and satellite transmission [What is Wi-Fi?] Wi-Fi is a wireless network that connects various devices and allows them to communicate with one another through radio waves [What is a virtual private network (VPN)?] A VPN is secure connection between two points on the internet [What is an intranet?] Intranet is a computer network that is similar to the internet but limits access to authorized users [What is a firewall?] Firewall is a software and hardware that limit data transfers to certain locations and log system use so that managers can identify attempts to log on with invalid passwords and other threats to a system's security [What is enterprise computing?] Enterprise computing is many types of hardware networked together to create a seamless data flow between organizations [What is cloud computing?] cloud computing is the use of powerful servers to store application software and databases for users to access via the web using anything from a PC to a smartphone [What are the benefits of cloud computing?] - On-demand self-service - Encompasses characteristics of grid computing - Encompasses characteristics of utility computing - Uses broad network access - Pools computing resources - Occurs on virtual servers **Security and Ethical Issues** [What is cybercrime?] Cybercrime is stealing or altering data in several ways. [What are phishing attacks?] A phishing attack uses deception to acquire sensitive personal information by impersonating an official-looking email or instant message. Typically, attackers may pose as a university, bank, or internet service provider. [What is cyber terrorism?] Cyberterrorism, a new generation of terrorism, can involve deliberate threats to information systems and can be associated with terrorist activities. [What are computer viruses?] Viruses, worms, Trojan horses, and spyware, collectively called malware, are malicious software programs designed to infect computer systems. These programs can destroy data, steal sensitive information, and even render information systems inoperable [What role does ethics play in information systems and IT?] Ethics in IT helps to ensure that these challenges are taken seriously and dealt with constantly to help ensure protection and reliability. **TED Talk -- Data and Ethics** - [Does the way organizations collect data on you concern you?] - [How should society balance the benefits of collecting and using data for technological advancement with the ethical concerns related to privacy, discrimination, and consent in the digital age?] **Disaster Recovery and Back-up** What is disaster recovery? What is a back-up system?

Use Quizgecko on...
Browser
Browser