Download Operational decisions are usually semi structured in nature! – false

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Page 1 of 9
Revision Points – Mid Term Test – 95%

What kind of decisions uses strategic information? – unstructured

What kind decisions are taken with a CRM? – tactical

Nature of Operational – short-term, repetitive, low risk, easy , Tactical – semi-structured,
medium risk, medium & Strategic Information – high risk, a lot of time, long-run

Classes of Information systems – operational information system – ATM; tactical IS –
YouTube channel (decision-support system) ; strategic information system (For example, a
strategic information system can be used to provide a product at a lower cost than
competing organizations. – business intelligence, news services, money markets)

Roles of the
CSO – chief security officer (A Chief Security Officer (CSO) is a organization's senior most
executive accountable for the development and oversight of policies and programs intended
for the mitigation and/or reduction of compliance, operational, strategic, financial and
reputational security risk strategies relating to the protection of people, intellectual assets
and tangible property.),
CFO – chief financial officer- responsible for managing the financial risks of the corporation.
This officer is also responsible for financial planning and record-keeping, as well as financial
reporting to higher management.
CEO - A chief executive officer describes the position of the most senior corporate officer,
executive, leader or administrator in charge of managing an organization.
CKO - chief knowledge officer (CKO) is an organizational leader, responsible for ensuring
that the organization maximizes the value it achieves through "knowledge". The CKO is
responsible for managing intellectual capital and the custodian of Knowledge Management
practices in an organization.
CIO – chief information officer - senior executive in an enterprise responsible for the
information technology and computer systems that support enterprise goals.

HOT ROOM, COLD ROOM – equipment only, WARM ROOM – equipment and some
skeletons; examples of business continuity planning;
The cheapest form of BPC is cold room.

What is the nature/purpose of a CMS – critical mission system – a system whose failure
may result in the failure of some goal-directed activity. Mission essential equipment and
mission critical application are also known as mission critical system. Examples of mission
critical systems are: an online banking system, railway / aircraft operating and control
systems, electric power systems, and many other computer systems that will adversely
affect business and society seriously if downed - can’t fail, doesn’t fail – expensive
Page 2 of 9

What is the nature/purpose of a CRM – customer relationship management - Customer
relationship management (CRM) is a term that refers to practices, strategies and
technologies that companies use to manage and analyze customer interactions and data
throughout the customer lifecycle, with the goal of improving business relationships with
customers, assisting in customer retention and driving

Structured/semi structured/unstructured!

TPS /EIS – transaction processes system - Transaction processing is a style of computing
that divides work into individual, indivisible operations, called transactions.[1] A transaction
processing system (TPS) or transaction server is a software system, or software/hardware
combination, that supports transaction processing;

DSS - decision support system – A decision support system (DSS) is a computer-based
information system that supports business or organizational decision-making activities,
typically resulting in ranking, sorting or choosing from among alternatives
EIS - An enterprise information system (EIS) is any kind of information system which improves
the functions of an enterprise business processes by integration. This means typically offering high
quality of service, dealing with large volumes of data and capable of supporting some large and
possibly complex organization or enterprise. An EIS must be able to be used by all parts and all levels
of an enterprise; normally a strategic information system
 Goal Seek
The Goal Seek tool in Excel is frequently classed as an optimized decision support tool – true;
optimization support tool; gives us exact result

Spin Control – in excel; change the value in cell and connect it to a spin control

AI – artificial intelligence – application used – Expert system – if, if, etc.

Pivot Tables – using them for slicing and dicing data, comparing

VR – virtual reality – we can use it for real and simulated systems – to train people and
might use them for virtualization (like a cloud) – resources are not being moved locally – use
it as communication to move around physical objects. Virtual reality (VR) typically refers to
computer technologies that use software to generate the realistic images, sounds and other
sensations that replicate a real environment (or create an imaginary setting), and simulate a
user's physical presence in this environment.

Fuzzy Logic - Fuzzy logic is a form of many-valued logic in which the truth values of variables
may be any real number between 0 and 1. By contrast, in Boolean logic, the truth values of
variables may only be the integer values 0 or 1. Fuzzy logic has been employed to handle the
concept of partial truth, where the truth value may range between completely true and
completely false.

Virtual Workforce – a remote workforce; they don’t have to be in an office building to do
their work; they might be situated in remote locations
Page 3 of 9

Genetic Algorithm - used by systems which are trying to find out what is the best-fit
scenario; what is the cheapest? What generates the best optimal decision? In computer
science and operations research, a genetic algorithm (GA) is a metaheuristic inspired by the
process of natural selection that belongs to the larger class of evolutionary algorithms (EA).
Genetic algorithms are commonly used to generate high-quality solutions to optimization
and search problems by relying on bio-inspired operators such as mutation, crossover and
selection.

Nature of SCM – supply chain management system; the management of the flow of goods
and services, involves the movement and storage of raw materials, of work-in-process
inventory, and of finished goods from point of origin to point of consumption upstream –
the cheapest cost-effective supplies; downstream - customer

SCM Bullwhip - The bullwhip effect is a distribution channel phenomenon in which forecasts
yield supply chain inefficiencies. It refers to increasing swings in inventory in response to
shifts in customer demand as one moves further up the supply chain.

Forecast Function – forecasts future variables for the ones that we already have

Supply Chain Planning Software – Supply chain planning (SCP) is the component of supply
chain management (SCM) involved with predicting future requirements to balance supply
and demand. The software enables us to maximize the efficiency. Logility Voyager Supply
Planning™ optimizes complex sourcing and production scenarios to balance demand, supply,
manufacturing and distribution constraints based on corporate goals for minimizing costs.
Making optimal use of critical resources and inventory while meeting forecasted demand
requires synchronization, proactive planning and efficient response to supply chain
disruptions.
 7 Principle of Supply Chain Management Principle 1: Segment customers based on the ser-vice needs of distinct groups and adapt the supply
chain to serve these segments profitably.
Principle 2: Customize the logistics network to the service requirements and profitability of customer
segments.
Principle 3: Listen to market signals and align demand planning accordingly across the supply chain,
ensuring consistent forecasts and optimal resource allocation
Principle 4: Differentiate product closer to the customer and speed conversion across the supply
chain
Principle 5: Manage sources of supply strategically to reduce the total cost of owning materials and
services
Principle 6: Develop a supply chain-wide technology strategy that supports multiple levels of
decision making and gives a clear view of the flow of products, services, and information
Principle 7: Adopt channel-spanning performance measures to gauge collective success in reaching
the end-user effectively and efficiently
Page 4 of 9

RFID Technology - Radio-frequency identification (RFID) uses electromagnetic fields to
automatically identify and track tags attached to objects. The tags contain electronically
stored information. Passive tags collect energy from a nearby RFID reader's interrogating
radio waves. Active tags have a local power source such as a battery and may operate at
hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the
line of sight of the reader, so it may be embedded in the tracked object. RFID is one method
for Automatic Identification and Data Capture (AIDC).
Smart chip; radio frequency identifiers – very cheap

CSFs – critical success factors - Critical success factor (CSF) is a management term for an
element that is necessary for an organization or project to achieve its mission. It is a critical
factor or activity required for ensuring the success of a company or an organization. The
term was initially used in the world of data analysis and business analysis. For example, a
CSF for a successful Information Technology project is user involvement.[1]

KPIs - A Key Performance Indicator (KPI) is a measurable value that demonstrates how
effectively a company is achieving key business objectives. Organizations use KPIs to
evaluate their success at reaching targets.

Effective vs Efficient – effective is better - The difference between effectiveness and
efficiency can be summed up shortly, sweetly and succinctly – Being effective is about doing
the right things, while being efficient is about doing things right.

Wintel - Wintel is a portmanteau of Windows and Intel, referring to personal computers
using Intel x86-compatible processors running Microsoft Windows

Legacy systems/ - computing, a legacy system is an old method, technology, computer
system, or application program, "of, relating to, or being a previous or outdated computer
system."Often a pejorative term, referencing a system as "legacy" means that it paved the
way for the standards that would follow it.

nature of mainframes - Although the term mainframe first described the physical
characteristics of early systems, today it can best be used to describe a style of operation,
applications, and operating system facilities. Today, computer manufacturers don't always
use the term mainframe to refer to mainframe computers. Instead, most have taken to
calling any commercial-use computer— large or small— a server, with the mainframe simply
being the largest type of server in use today. IBM®, for example, refers to its latest
mainframe as the IBM System z9® server. We use the term mainframe in this section to
mean computers that can support thousands of applications and input/output devices to
simultaneously serve thousands of users.
Most systems on mainframes are legacy systems because they can’t fail and they don’t fail.
They’ve been here for long and people have debugged them. They are frequently used as
legacy systems.

Productivity Applications - Productivity software (sometimes called personal productivity
software or office productivity software) is application software dedicated to producing
information, such as documents, presentations, worksheets, databases, charts, graphs,
digital paintings, electronic music and digital video.Its names arose from the fact that it
increases productivity, especially of individual office workers, from typists to knowledge
Page 5 of 9
workers, although its scope is now wider than that. Office suites, which brought word
processing, spreadsheet, and relational database programs to the desktop in the 1980s, are
the core example of productivity software.

Expert Systems - a computer system that emulates the decision-making ability of a human
expert. Expert systems are designed to solve complex problems by reasoning about
knowledge, represented mainly as if–then rules rather than through conventional
procedural code.

BPR – Business process reengineering – we try to make the business more efficient and
more effective; it is a methodology; not a plan.
Business process re-engineering (BPR) is a business management strategy, originally
pioneered in the early 1990s, focusing on the analysis and design of workflows and business
processes within an organization. BPR aimed to help organizations fundamentally rethink
how they do their work in order to dramatically improve customer service, cut operational
costs, and become world-class competitors.[

Goal Seek! - Goal Seek is a built-in Excel tool that allows you to see how one data item in a
formula impacts another

Primary Value Activities - The primary activities of Michael Porter's value chain are inbound
logistics, operations, outbound logistics, marketing and sales, and service. The primary
activities within Michael Porter's value chain are used to provide a company with a
competitive advantage in any one of the five activities so that it has an advantage in the
industry in which it operates. The goal of the five activities is to create value that exceeds
the cost of conducting that activity, therefore generating a higher profit.

Nature of a Business Process - A business process is an activity or set of activities that will
accomplish a specific organizational goal. Business process management (BPM) is a
systematic approach to improving those processes.

ERP - Enterprise resource planning (ERP) is business process management software that
allows an organization to use a system of integrated applications to manage the business
and automate many back office functions related to technology, services and human
resources.

Granularity of information. - Granularity is the level of depth represented by the data in a
fact or dimension table in a data warehouse. High granularity means a minute, sometimes
atomic grade of detail, often at the level of the transaction. Granularity (also called
"graininess", the quality of being grainy) is the extent to which a material or system is
composed of distinguishable pieces or grains. It can either refer to the extent to which a
larger entity is subdivided, or the extent to which groups of smaller indistinguishable entities
have joined together to become larger distinguishable entities

Lookup Tables - The LOOKUP function in Excel is used to search one column of data and find
data in the corresponding row.
A Lookup table in Excel enables users to apply qualitative comments to individual cell values!
- true
Page 6 of 9

Excel Macros

Blade Servers - A blade server is a stripped-down server computer with a modular design
optimized to minimize the use of physical space and energy. Blade servers have many
components removed to save space, minimize power consumption and other
considerations, while still having all the functional components to be considered a computer

Social Networking – Facebook

Intranet - An intranet is a private network based on TCP/IP protocols, belonging to an
organization, usually a corporation, accessible only by the organization's members,
employees, or others with authorization.

/Extranet - An extranet is a website that allows controlled access to partners, vendors and
suppliers or an authorized set of customers – normally to a subset of the information
accessible from an organization's intranet.

WMAN – A wireless metropolitan area network (WMAN) is a form of wireless networking
that has an intended coverage area — a range — of approximately the size of a city. A
WMAN spans a larger area than a wireless local area network (WLAN) but smaller than a
wireless wide area network (WWAN).

WEP (Wired Equitant Privacy) - Wired Equivalent Privacy (WEP) is a security algorithm for
IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in
1997, its intention was to provide data confidentiality comparable to that of a traditional
wired network.[1] WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104
bits), was at one time widely in use and was often the first security choice presented to
users by router configuration tools.

WLAN – Wi Fi Lan - A wireless local area network (WLAN) is a wireless computer network
that links two or more devices using a wireless distribution method (often spread-spectrum
or OFDM radio) within a limited area such as a home, school, computer laboratory, or office
building.

GPS - The Global Positioning System (GPS) is a space-based radionavigation system owned
by the United States government and operated by the United States Air Force. It is a global
navigation satellite system that provides geolocation and time information to a GPS receiver
anywhere on or near the Earth where there is an unobstructed line of sight to four or more
GPS satellites.

Cloud Computing - Cloud computing is a type of Internet-based computing that provides
shared computer processing resources and data to computers and other devices on
demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of
configurable computing resources (e.g., computer networks, servers, storage, applications
and services, which can be rapidly provisioned and released with minimal management
effort. virtualization

BCP - Business continuity planning – we have plan in an event of catastrophe; it is a plan not
a methodology - the process of creating systems of prevention and recovery to deal with
potential threats to a company.
Page 7 of 9



E-Business - Electronic Business or e-business is a term which can be used for any kind of
business or commercial transaction that includes sharing information across the internet.
Commerce constitutes the exchange of products and services between businesses, groups
and individuals and can be seen a as one of the essential activities of any business.
vs Ecommerce - Electronic commerce, commonly written as e-commerce or eCommerce, is
the trading or facilitation of trading in products or services using computer networks, such as
the Internet or online social networks.
Transactions aren't required to have a price and include both sales and items like free downloads. Ecommerce includes transactions made on the internet, Intranet, Extranet, World Wide Web, by
email and even by fax. E-business is broader than e-commerce; including the transaction based ecommerce businesses and those who run traditionally but cater to online activities as well. Ecommerce is part of e-business.
Conditional formatting in Excel is designed to sort the Worksheet data! – false
The Excel Macro feature can enable end users to roll up a designated sequence of steps in a easy to
access clickable object! – true
Two of the ways Excel Macros can be created is by: both ways
Lookup tables usually enable tactical decision making! -true
Strategic decisions are usually: unstructured
Tactical decisions are usually highly structured! – false; semi-structure
) Operational decisions are usually semi structured in nature! – false; highly structured
WINTEL refers to organizations software/hardware architecture built around the Windows OS and
Intel microprocessors: - true
the world's mainframe computer market is dominated by: IBM
A CMS type system is a system which is: A system which is virtually crash proof!
A GUI application is a: Graphical User Interface
An OS such as Windows is usually thought of as a productivity type application! – false – excel, word,
access,
contemporary mini computer is usually classified as being that type of a computer that lies between
the processing power of a contemporary mainframe computer and a contemporary super computer!
– false
In Western jurisdiction computer controlled computer systems are frequently held to be better
decision makers than human controlled computer systems!
an OS for a mobile phone is very similar to that used on a tablet/laptop computer!- true
An OS can be used – all of the above
Page 8 of 9
Proprietary software is that software which can only run on an architecture supplied by the
software's authors! – true
A killer app is frequently thought of as: - a must-have
A business process is: a standardised activity!
Inbound logistics unlike outbound logistics are deemed as primary value activities! – false
Firm infrastructure and HRM are thought of as "Support Value" activities! – true
Business Process Re-engineering seeks to improve current processes/workflows! – true
In SCM terminology - downstream refers to raw supplies entering the system whilst upstream is
about delivering goods/services to customers! – false
Customers – downstream; suppliers- upstream
An expert system is usually: facilitate professional decision making!
Enterprise Resource Planning systems are: multifunctional
An SCM can 'Create entry barriers thereby reducing the threat of new entrants!" – true
The main purpose of a CIO in an organization is to: chief information officer - Ensure that the
Organizational IS is fully aligned with the Organizational goals!
An IS which is secure but unethical is dangerous to the organization's future survival? – true
IS downtime can be a result of: all of the above
A user/employee who understands the nature of modern business technology as well as the nature
of the accounting equation and other business tools is frequently referred to as a: hybrid worker
) The CSO officer in an organization is usually responsible for: chief security officer Data/Hardware/Software Security
Organizational information such as customer details, bank details, patents etc is classed as
intellectual capital that must be protected! – true
The granularity of information depends on the required level of detail! – true
Summarised data is thought of as being of coarse granularity?
Strategic decision making is usually carried out by the lower orders of the organization! – false
Tactical decision making is low risk and very complicated! – false
Operational decisions are usually simple and low risk! – true
Tactical Information Systems focus on long term decision making! – false – medium-term
The National News Service is a good example of a Strategic Information System –
Operational decisions rely upon information which is exact in nature! – true
Customer Relationship Management System is a good example of a Tactical Information System! –
A restaurant menu can be described as an Information System! – true
Page 9 of 9
Operational decisions are usually complex, high risk and long term! - false