Chapter 1
Chapter 1
1. Why is the era called the information age
2. Who is a knowledge worker
3. What is the difference between MIS and IT
4. Explain what is telecommuting; why would people want to telecommute;
5. Why are some arguments for and against telecommuting
6. What is the difference between data and information
7. What is BI and why is it important to businesses
8. What are the three views of information (time, location, form), explain
9. What is an intranet and how are companies using it to their advantage
10. Explain the ways in which information flow and why are these flows necessary
11. Explain what is meant by information granularity and why it is important
12. Explain and give examples of internal, external, objective, and subjective information
13. What is the difference between a technology literate and information literate knowledge worker
14. What does ubiquitous computing mean
15. Explain the differences between decentralized and centralized computing; what are the advantages and disadvantages of each
16. Explain and give examples of the various types of information systems found in companies (customer self service systems, TPS, OLTP, SCM, EDI and so on)
17. Why cant we have just one type of IS to satisfy all of the organization’s info/data needs, explain
18. How will this course affect your career
Chapter 2 Major Business initiatives
1. Explain Porter Five Forces; what is it used for; how can technology be used to deal with the forces; make sure to explain concepts like switching cost, loyalty programs, entry barrier, and so on
2. What is the value chain and how may companies use it to gain competitive advantage; what role does technology play in the value chain
3. What is supply chain management; what is its primary role; explain how a company like Wal-Mart may use and benefit from its use; how can SCM play a role in gaining strategic and competitive advantage; what role does technology play in SCM
4. What is CRM; what is its primary role; explain how a company like Comcast may use and benefit from its use; how can CRM play a role in gaining strategic and competitive advantage; what role does technology play in CRM
5. What is BI; how did BI come about; How do companies use BI; what role does the data warehouse play in BI; what is the diff betw a data warehouse and data mart
6. What is ICE; what is it primary purpose; also explain workflow systems, social network systems and give examples
ELM-A Hardware/software
1. Explain the differences between software, hardware, CPU, input devices, etc.
2. Explain what are application, software, operating system software, and utility software and give examples of each
3. Explain the differences between a PDA, tablet pc, notebook, laptop, mini, mainframe, and supercomputer
4. Explain what are vertical market software and horizontal market software and give examples
5. What is meant by open source software
6. What is the primary purpose of ASCII
7. What are some of the uncommon input devices (pointing stick, optical mark reader, optical character reader, biometric scanner, etc)
8. What are the two types of monitors and what are the advantages/disadv of each
9. What are some of the characteristics of a monitor (pixels, dot pitch)
10. What are the various types of printers
11. What is the difference between a meg, gig, terabyte
12. Explain the various types of CD/DVD ROMs (CD-ROM CR-R, CD-RW)
13. Explain the purpose of RAM
14. What is the control unit and its primary purpose; where do you find it
15. What is a system bus
16. What is a CPU cache and what is it used for
17. What is the ALU and where is it located
18. What is a port and where would you find one; what are the various types of ports
19. What are the various types of wireless connections (Bluetooth, infrared, WiFi)
20. What is an expansion card and slot
Chapter 3 Database and Data Warehouse
1. Define database and its primary purpose
2. What is a relational database
3. Explain the difference between OLTP and OLAP
4. What is a relation
5. What makes up the data dictionary
6. What is a primary key and what its primary purpose is; give examples
7. Give examples of things that will not serve as good primary keys
8. What is a foreign key and what purpose does foreign keys serve
9. Explain what is integrity constraints and why it is important to database design
10. What does DBMS stand for and what is its purpose.
11. What are some of the things that make up the DBMS
12. What is the difference between the logical view and the physical view
13. Explain the difference between the DDL data definition language and data manipulation language DML
14. What is a view and why do we need views
15. What is query by example and why do we need it
16. What is SQL and what role does it play in DB design
17. What is the purpose of the application generation subsystems and the data administration subsystem
18. List the components of the admin subsystem (backup and recovery, security mgmt, concurrency control, etc) and discuss what each does
19. What is a data warehouse and what purpose does it serve
20. How does a data warehouse differ from an operational database
21. Explain data mining
22. What are intelligent agents and what do they do
23. Explain the purpose of multidimensional analysis tools
24. What is the difference between a data mart and a data warehouse
25. What is the difference between a database administrator and a data administrator
26. What does ETL stand for
ELM-C Database Design
What is an entity class
What is a primary key and its purpose
What is the connection between a primary key and a table
What is an instance
What is an ERD and when do we use it
What is the purpose of normalization
What is an intersection relation, or composite relation
What is a composite primary key
Why do we need foreign keys
What is a field; a field is the same as a __________ in a table
What is a data type and what purpose do they serve
Every entity class becomes a _________ in the database
Chapter 4 DSS and AI
1. What are the four phases of the decision making process; explain what is involved in each phase
2. What are the type of decisions people face and what is the difference between them (structured, unstructured, recurring, nonrecurring)
3. What does the term DSS mean and what are they used for
4. What are the components of a DSS, explain the purpose of each component
5. Do you know of any Microsoft application that can be used as a DSS
6. What is a geographic IS, what are they used for, and give examples of GIS
7. Explain AI; what are some of the major types of AI systems, explain each type (expert systems, neural networks, genetic algorithms, intelligent agents) and how it may be used in a business setting. For each type make sure to understand key concepts, for example, there are four types of intelligent agents (information agents, data mining agents, and so on), while genetic algorithms uses three concepts of evolution (selection, crossover, mutation)
8. In what areas of business are AI systems being used, provide some examples
Multi-agent based modeling will not be on the quiz.
E-Commerce Chapter 5
Group 1 (pg 240-244)
What is E-commerce
What are the different types of e-commerce
Which type of E-commerce does the most business
What is the diff between B2B and B2C
Group 2 (pg 244-249)
Define the terms below and explain how E-commerce makes them possible
e-market place
Commodity vs digital
Mass customization
MRO vs direct materials
Reverse auction
Horizontal versus vertical e-marketplace
Group 3 (pg 250 – 254)
Define the terms below and explain your like and dislikes of each
Marketing mix
Define banner ads
Pop up ads
Viral marketing
Affiliate programs
Click through
Conversion rate
Group 4 (pg 254-261)
Explain the various types of e-commerce payment systems and discuss the advantages and disadvantages
Discuss the various security technologies (encryption, SSL etc) to keep payments safe
Group 5 (Pg 261-265)
How do governments use e-commerce (e-government)? Give some examples.
Chapter 6 Systems Development
1. What does the acronym SDLC mean and what is it used for, explain
2. What are the phases of the SDLC and explain each step in detail
3. For the planning phase, explain these terms CSF, scope creep, feature creep, and so on.
4. For the analysis phase explain business requirements, JAD, requirements definition document
5. For the design phase explain modeling, technical architecture
6. For the testing phase explain test conditions, unit testing, systems testing and so on
7. For the implementation phase explain parallel, plunge, pilot, and phased implementation and explain their differences. How would you decide which to choose
8. Explain the similarities and differences betw the various methods (waterfall, rapid prototyping, extreme programming, and agile methodology)
9. Explain the differences of outsourcing, offshore outsourcing, nearshore outsourcing, and onshore outsourcing; what are the pros and cons of outsourcing
10. What is a prototype, proof-of-concept prototype, selling prototype
Info Tech Infrastructure Chapter 7
(Pg 318-320)
What are enterprise systems (ES) and why are the important?
How did ES started out and where are they today?
What role does internet and intranet play in ES?
(Pg 320-326)
What are ERP systems?
Explain the connection betw ERP sys, organizational fit, culture and org strategy.
Discuss the evolution of ERP systems
List the primary ERP vendors
(Pg 326-328)
What are agile systems?
Why do companies need agile systems?
What are some characteristics of agile systems?
(pg 332-336)
What are the 4 types of IT infrastructure?
Explain the adv/disadvantage of each type.
Pg 337-
Explain backup and recovery and why they are important
What is a SAN (storage area network)
What is a disaster recovery plan and explain why it is important
Explain collocation, cold site, hot site, and the disaster recovery cost curve
Protecting People and Info chap 8
(Pg 356-358)
What are ethics?
What are the factors that determine ethical behavior?
Define the terms (intellectual property, copy right, fair use doctrine) of intellectual property
(pg 361-367)
What are some of the issues surrounding the protection of people’s privacy?
What are some technologies for invading privacy?
What are some issues with identity theft and how do we protect ourselves?
Does an employer have the right to monitor what you do in terms of your use of company resources like email, browsing etc.
(Pg 367 -376)
What are some IT used to evade consumer privacy?
Explain IT such as cookies, spam, adware, spyware, web log, Trojan horse, etc.
What role does governmental agencies play with respect to privacy and should they be allowed to do that? Agencies include FBI, CIA, Nat Crime Info Center, NSA etc.
(Pg 376-382)
What are cyber crimes?
Give examples of technologies (virus, worm, denial of service attacks, etc) used to commit cyber crimes
Define the various types of hackers.
What measures can we take to protect ourselves from such crimes or attacks?
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- genesis chapter 1 questions and answers
- biology 101 chapter 1 quiz
- chapter 1 psychology test answers
- strategic management chapter 1 quiz
- psychology chapter 1 questions and answers
- cooper heron heward chapter 1 powerpoint
- chapter 1 psychology quiz
- chapter 1 what is psychology
- chapter 1 cooper heron heward
- medical terminology chapter 1 quiz
- holt physics chapter 1 test
- dod fmr volume 2a chapter 1 definitions