Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Page 1 of 9 Revision Points – Mid Term Test – 95% What kind of decisions uses strategic information? – unstructured What kind decisions are taken with a CRM? – tactical Nature of Operational – short-term, repetitive, low risk, easy , Tactical – semi-structured, medium risk, medium & Strategic Information – high risk, a lot of time, long-run Classes of Information systems – operational information system – ATM; tactical IS – YouTube channel (decision-support system) ; strategic information system (For example, a strategic information system can be used to provide a product at a lower cost than competing organizations. – business intelligence, news services, money markets) Roles of the CSO – chief security officer (A Chief Security Officer (CSO) is a organization's senior most executive accountable for the development and oversight of policies and programs intended for the mitigation and/or reduction of compliance, operational, strategic, financial and reputational security risk strategies relating to the protection of people, intellectual assets and tangible property.), CFO – chief financial officer- responsible for managing the financial risks of the corporation. This officer is also responsible for financial planning and record-keeping, as well as financial reporting to higher management. CEO - A chief executive officer describes the position of the most senior corporate officer, executive, leader or administrator in charge of managing an organization. CKO - chief knowledge officer (CKO) is an organizational leader, responsible for ensuring that the organization maximizes the value it achieves through "knowledge". The CKO is responsible for managing intellectual capital and the custodian of Knowledge Management practices in an organization. CIO – chief information officer - senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. HOT ROOM, COLD ROOM – equipment only, WARM ROOM – equipment and some skeletons; examples of business continuity planning; The cheapest form of BPC is cold room. What is the nature/purpose of a CMS – critical mission system – a system whose failure may result in the failure of some goal-directed activity. Mission essential equipment and mission critical application are also known as mission critical system. Examples of mission critical systems are: an online banking system, railway / aircraft operating and control systems, electric power systems, and many other computer systems that will adversely affect business and society seriously if downed - can’t fail, doesn’t fail – expensive Page 2 of 9 What is the nature/purpose of a CRM – customer relationship management - Customer relationship management (CRM) is a term that refers to practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention and driving Structured/semi structured/unstructured! TPS /EIS – transaction processes system - Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions.[1] A transaction processing system (TPS) or transaction server is a software system, or software/hardware combination, that supports transaction processing; DSS - decision support system – A decision support system (DSS) is a computer-based information system that supports business or organizational decision-making activities, typically resulting in ranking, sorting or choosing from among alternatives EIS - An enterprise information system (EIS) is any kind of information system which improves the functions of an enterprise business processes by integration. This means typically offering high quality of service, dealing with large volumes of data and capable of supporting some large and possibly complex organization or enterprise. An EIS must be able to be used by all parts and all levels of an enterprise; normally a strategic information system Goal Seek The Goal Seek tool in Excel is frequently classed as an optimized decision support tool – true; optimization support tool; gives us exact result Spin Control – in excel; change the value in cell and connect it to a spin control AI – artificial intelligence – application used – Expert system – if, if, etc. Pivot Tables – using them for slicing and dicing data, comparing VR – virtual reality – we can use it for real and simulated systems – to train people and might use them for virtualization (like a cloud) – resources are not being moved locally – use it as communication to move around physical objects. Virtual reality (VR) typically refers to computer technologies that use software to generate the realistic images, sounds and other sensations that replicate a real environment (or create an imaginary setting), and simulate a user's physical presence in this environment. Fuzzy Logic - Fuzzy logic is a form of many-valued logic in which the truth values of variables may be any real number between 0 and 1. By contrast, in Boolean logic, the truth values of variables may only be the integer values 0 or 1. Fuzzy logic has been employed to handle the concept of partial truth, where the truth value may range between completely true and completely false. Virtual Workforce – a remote workforce; they don’t have to be in an office building to do their work; they might be situated in remote locations Page 3 of 9 Genetic Algorithm - used by systems which are trying to find out what is the best-fit scenario; what is the cheapest? What generates the best optimal decision? In computer science and operations research, a genetic algorithm (GA) is a metaheuristic inspired by the process of natural selection that belongs to the larger class of evolutionary algorithms (EA). Genetic algorithms are commonly used to generate high-quality solutions to optimization and search problems by relying on bio-inspired operators such as mutation, crossover and selection. Nature of SCM – supply chain management system; the management of the flow of goods and services, involves the movement and storage of raw materials, of work-in-process inventory, and of finished goods from point of origin to point of consumption upstream – the cheapest cost-effective supplies; downstream - customer SCM Bullwhip - The bullwhip effect is a distribution channel phenomenon in which forecasts yield supply chain inefficiencies. It refers to increasing swings in inventory in response to shifts in customer demand as one moves further up the supply chain. Forecast Function – forecasts future variables for the ones that we already have Supply Chain Planning Software – Supply chain planning (SCP) is the component of supply chain management (SCM) involved with predicting future requirements to balance supply and demand. The software enables us to maximize the efficiency. Logility Voyager Supply Planning™ optimizes complex sourcing and production scenarios to balance demand, supply, manufacturing and distribution constraints based on corporate goals for minimizing costs. Making optimal use of critical resources and inventory while meeting forecasted demand requires synchronization, proactive planning and efficient response to supply chain disruptions. 7 Principle of Supply Chain Management Principle 1: Segment customers based on the ser-vice needs of distinct groups and adapt the supply chain to serve these segments profitably. Principle 2: Customize the logistics network to the service requirements and profitability of customer segments. Principle 3: Listen to market signals and align demand planning accordingly across the supply chain, ensuring consistent forecasts and optimal resource allocation Principle 4: Differentiate product closer to the customer and speed conversion across the supply chain Principle 5: Manage sources of supply strategically to reduce the total cost of owning materials and services Principle 6: Develop a supply chain-wide technology strategy that supports multiple levels of decision making and gives a clear view of the flow of products, services, and information Principle 7: Adopt channel-spanning performance measures to gauge collective success in reaching the end-user effectively and efficiently Page 4 of 9 RFID Technology - Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC). Smart chip; radio frequency identifiers – very cheap CSFs – critical success factors - Critical success factor (CSF) is a management term for an element that is necessary for an organization or project to achieve its mission. It is a critical factor or activity required for ensuring the success of a company or an organization. The term was initially used in the world of data analysis and business analysis. For example, a CSF for a successful Information Technology project is user involvement.[1] KPIs - A Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs to evaluate their success at reaching targets. Effective vs Efficient – effective is better - The difference between effectiveness and efficiency can be summed up shortly, sweetly and succinctly – Being effective is about doing the right things, while being efficient is about doing things right. Wintel - Wintel is a portmanteau of Windows and Intel, referring to personal computers using Intel x86-compatible processors running Microsoft Windows Legacy systems/ - computing, a legacy system is an old method, technology, computer system, or application program, "of, relating to, or being a previous or outdated computer system."Often a pejorative term, referencing a system as "legacy" means that it paved the way for the standards that would follow it. nature of mainframes - Although the term mainframe first described the physical characteristics of early systems, today it can best be used to describe a style of operation, applications, and operating system facilities. Today, computer manufacturers don't always use the term mainframe to refer to mainframe computers. Instead, most have taken to calling any commercial-use computer— large or small— a server, with the mainframe simply being the largest type of server in use today. IBM®, for example, refers to its latest mainframe as the IBM System z9® server. We use the term mainframe in this section to mean computers that can support thousands of applications and input/output devices to simultaneously serve thousands of users. Most systems on mainframes are legacy systems because they can’t fail and they don’t fail. They’ve been here for long and people have debugged them. They are frequently used as legacy systems. Productivity Applications - Productivity software (sometimes called personal productivity software or office productivity software) is application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.Its names arose from the fact that it increases productivity, especially of individual office workers, from typists to knowledge Page 5 of 9 workers, although its scope is now wider than that. Office suites, which brought word processing, spreadsheet, and relational database programs to the desktop in the 1980s, are the core example of productivity software. Expert Systems - a computer system that emulates the decision-making ability of a human expert. Expert systems are designed to solve complex problems by reasoning about knowledge, represented mainly as if–then rules rather than through conventional procedural code. BPR – Business process reengineering – we try to make the business more efficient and more effective; it is a methodology; not a plan. Business process re-engineering (BPR) is a business management strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows and business processes within an organization. BPR aimed to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational costs, and become world-class competitors.[ Goal Seek! - Goal Seek is a built-in Excel tool that allows you to see how one data item in a formula impacts another Primary Value Activities - The primary activities of Michael Porter's value chain are inbound logistics, operations, outbound logistics, marketing and sales, and service. The primary activities within Michael Porter's value chain are used to provide a company with a competitive advantage in any one of the five activities so that it has an advantage in the industry in which it operates. The goal of the five activities is to create value that exceeds the cost of conducting that activity, therefore generating a higher profit. Nature of a Business Process - A business process is an activity or set of activities that will accomplish a specific organizational goal. Business process management (BPM) is a systematic approach to improving those processes. ERP - Enterprise resource planning (ERP) is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources. Granularity of information. - Granularity is the level of depth represented by the data in a fact or dimension table in a data warehouse. High granularity means a minute, sometimes atomic grade of detail, often at the level of the transaction. Granularity (also called "graininess", the quality of being grainy) is the extent to which a material or system is composed of distinguishable pieces or grains. It can either refer to the extent to which a larger entity is subdivided, or the extent to which groups of smaller indistinguishable entities have joined together to become larger distinguishable entities Lookup Tables - The LOOKUP function in Excel is used to search one column of data and find data in the corresponding row. A Lookup table in Excel enables users to apply qualitative comments to individual cell values! - true Page 6 of 9 Excel Macros Blade Servers - A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer Social Networking – Facebook Intranet - An intranet is a private network based on TCP/IP protocols, belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. /Extranet - An extranet is a website that allows controlled access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. WMAN – A wireless metropolitan area network (WMAN) is a form of wireless networking that has an intended coverage area — a range — of approximately the size of a city. A WMAN spans a larger area than a wireless local area network (WLAN) but smaller than a wireless wide area network (WWAN). WEP (Wired Equitant Privacy) - Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.[1] WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely in use and was often the first security choice presented to users by router configuration tools. WLAN – Wi Fi Lan - A wireless local area network (WLAN) is a wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building. GPS - The Global Positioning System (GPS) is a space-based radionavigation system owned by the United States government and operated by the United States Air Force. It is a global navigation satellite system that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. Cloud Computing - Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services, which can be rapidly provisioned and released with minimal management effort. virtualization BCP - Business continuity planning – we have plan in an event of catastrophe; it is a plan not a methodology - the process of creating systems of prevention and recovery to deal with potential threats to a company. Page 7 of 9 E-Business - Electronic Business or e-business is a term which can be used for any kind of business or commercial transaction that includes sharing information across the internet. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen a as one of the essential activities of any business. vs Ecommerce - Electronic commerce, commonly written as e-commerce or eCommerce, is the trading or facilitation of trading in products or services using computer networks, such as the Internet or online social networks. Transactions aren't required to have a price and include both sales and items like free downloads. Ecommerce includes transactions made on the internet, Intranet, Extranet, World Wide Web, by email and even by fax. E-business is broader than e-commerce; including the transaction based ecommerce businesses and those who run traditionally but cater to online activities as well. Ecommerce is part of e-business. Conditional formatting in Excel is designed to sort the Worksheet data! – false The Excel Macro feature can enable end users to roll up a designated sequence of steps in a easy to access clickable object! – true Two of the ways Excel Macros can be created is by: both ways Lookup tables usually enable tactical decision making! -true Strategic decisions are usually: unstructured Tactical decisions are usually highly structured! – false; semi-structure ) Operational decisions are usually semi structured in nature! – false; highly structured WINTEL refers to organizations software/hardware architecture built around the Windows OS and Intel microprocessors: - true the world's mainframe computer market is dominated by: IBM A CMS type system is a system which is: A system which is virtually crash proof! A GUI application is a: Graphical User Interface An OS such as Windows is usually thought of as a productivity type application! – false – excel, word, access, contemporary mini computer is usually classified as being that type of a computer that lies between the processing power of a contemporary mainframe computer and a contemporary super computer! – false In Western jurisdiction computer controlled computer systems are frequently held to be better decision makers than human controlled computer systems! an OS for a mobile phone is very similar to that used on a tablet/laptop computer!- true An OS can be used – all of the above Page 8 of 9 Proprietary software is that software which can only run on an architecture supplied by the software's authors! – true A killer app is frequently thought of as: - a must-have A business process is: a standardised activity! Inbound logistics unlike outbound logistics are deemed as primary value activities! – false Firm infrastructure and HRM are thought of as "Support Value" activities! – true Business Process Re-engineering seeks to improve current processes/workflows! – true In SCM terminology - downstream refers to raw supplies entering the system whilst upstream is about delivering goods/services to customers! – false Customers – downstream; suppliers- upstream An expert system is usually: facilitate professional decision making! Enterprise Resource Planning systems are: multifunctional An SCM can 'Create entry barriers thereby reducing the threat of new entrants!" – true The main purpose of a CIO in an organization is to: chief information officer - Ensure that the Organizational IS is fully aligned with the Organizational goals! An IS which is secure but unethical is dangerous to the organization's future survival? – true IS downtime can be a result of: all of the above A user/employee who understands the nature of modern business technology as well as the nature of the accounting equation and other business tools is frequently referred to as a: hybrid worker ) The CSO officer in an organization is usually responsible for: chief security officer Data/Hardware/Software Security Organizational information such as customer details, bank details, patents etc is classed as intellectual capital that must be protected! – true The granularity of information depends on the required level of detail! – true Summarised data is thought of as being of coarse granularity? Strategic decision making is usually carried out by the lower orders of the organization! – false Tactical decision making is low risk and very complicated! – false Operational decisions are usually simple and low risk! – true Tactical Information Systems focus on long term decision making! – false – medium-term The National News Service is a good example of a Strategic Information System – Operational decisions rely upon information which is exact in nature! – true Customer Relationship Management System is a good example of a Tactical Information System! – A restaurant menu can be described as an Information System! – true Page 9 of 9 Operational decisions are usually complex, high risk and long term! - false