Download Exam 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Versant Object Database wikipedia , lookup

Business intelligence wikipedia , lookup

Information security wikipedia , lookup

Concurrency control wikipedia , lookup

Database wikipedia , lookup

Relational model wikipedia , lookup

Clusterpoint wikipedia , lookup

Computer security wikipedia , lookup

Database model wikipedia , lookup

Transcript
Review
Exam 1
Chapters 1 - 5
Chapter 1 – MIS and You
•
•
MIS, IS, and IT
IS Components
–
–
–
–
–
•
•
Information and Data
Information Characteristics
–
–
–
–
–
•
•
Hardware
Software
Data
Procedures
People
Accurate: cross check
Timely: real time
Relevant
Just barely sufficient
Worth its cost
Moore’s Law
Discussion and Case Study
Chapter 1 - Discussion
• Security: password and password
etiquette (5a-b)
• Ethics: misdirected information use (11a-b)
Chapter 1 - Case Study
• Case 1-1 Computerizing the Ministry of
foreign Affairs (20-21)
• Case 1-2 IRS Requirements Creep (2122)
Chapter 2 Purpose of Information
Systems
•
Information Systems Purposes
– Competitive Advantage
– Problem Definition
– Decision Making
•
Competitive Advantage
–
–
–
–
•
Products
creation of barriers
Establishing alliances
Reducing costs
Problem Definition
– Customer relationship management (CRM) system
– Knowledge management system (KMS)
– Manufacturing Quality-Control Information System
•
Decision Making Dimension
– Transaction processing systems (TPS)
– Management information systems (MIS)
– Executive information systems (EIS)
•
Discussion and Case Study
Chapter 2 - Discussion
• Security (27a-b)
– Name the competitive advantages for a financial
institution by implementing security system
– The cost of no security for a financial institute
• Ethics (29a-b)
– Social impact of the digital divide
– Responsibility for business and government
• Opposing forces (31a-b)
– Can a business survive without any IS?
• Egocentric vs. empathetic thinking (33a-b)
– How to apply this concept in developing and using
IS?
Chapter 2 - Case Study
• Case study 2-1Microsoft Customer
Support (41-42)
Chapter 3 – Hardware & Software
•
•
Computer
Hardware
– Input, processing, output, storage, and communication
•
Computer Data and Instruction
– Microsoft Windows: Intel instruction set by Intel Corporation
– Macintosh computers: PowerPC instruction set using Powerful PC processor
•
•
CPU (Central Processing Unit) and memory
Computer Performance
– The speed of main memory
– The speed and width of the data bus
•
Software
– Operating system (OS)
– Application software
•
Computer Virus
– Type
– Prevention
Chapter 3 - Discussion
• Security (53a-b)
– How to enforce employees to follow the antivirus policy and
procedure in any organization
– State your opinions related to the statement “the viruses are
developed by the antivirus software vendor”
• Opposing forces (57a-b)
– State your opinions related to the statement “the new computer
products are the conspiracy between hardware and software
vendors to ripe off consumers”
• Ethics (61a-b)
– State your opinions about the major impacts in terms of social,
entertainment, government, and business operations by
implementing the TCG/NGSCB (Trusted Computing Group/Next
Generation Secure Computing Base)
Chapter 3 - Case Study
• Case 3-1 (69-70) Wall Data IS Support:
every one except 6 & 9
• Case 3-2 (70-71) Dell Leverages the
Internet: questions 1 & 2
Chapter 4 – Database Processing
•
•
Purpose of Database
Components of Database System
– User, application, DBMS, and database
•
•
•
Multi-user Processing
Relational Database Design
Entity-relationship Model
–
–
–
–
•
Primary key, foreign key
Relationship (dependent and independent)
Cardinality
Normalization
Database Administration
– DBA and steering committee
•
Database Security
– Firewall, OS and DBMS patches, physical security, logical security, logs and
security emergency plan
•
Discussion, Design, and Case Study
Chapter 4 - Discussion
• Ethics (81a-b)
– What should the company do to avoid the situation at first place?
– What should the company do to properly handle Kelly’s case
– What should Kelly do to avoid the stated consequence after
querying the database?
– What could Kelly do to save his career?
• Opposing forces (97a-b)
– What should the DBA of car dealer do to convince every
salesperson to build and use a solid sales information database?
• Reflections (101a-b)
– What should the DBA of any organization to handle the changing
requirements for a new database?
– What should the DBA of any organization to handle the new
requirements for a existing database?
Chapter 4 - Relational Database
Design
• Given the following entities and their attributes
–
–
–
–
–
Buyer (BuyerID, BuyerName)
Owner (OwnerID, OwnerName)
Property (PropertyID, PropertyAddres, OwnerID)
Agent (AgentID, AgentName)
Sales (SalesID, BuyerID, OwnerID, PropertyID,
AgentID, Price, Date)
• Design a relational database
– Create primary key for every entity and the necessary
foreign key
– Create an entity-relationship diagram
Chapter 4 - Case Study
• Assignment 22 (105)
• Case 4-1 (107-110): questions 1, 4, and 7
(add aircraft for 7)
• Case 4-2 (110-113): questions 1 and 2
Chapter 5 - Telecommunication &
Internet Technology
• Network Concepts
– Protocol, wire, modem
• TCP/IP-OSI Architecture
– Application, transport, Internet, data link, physical
• Network Types
– LAN
– WAN
– Public Switched Data Network (frame relay, asynchronous transfer
mode, and Ethernet)
– Virtual Private Network
•
•
•
•
•
Network Comparison
Internet
Domain Name System
IP Addressing Schemes
Security
Chapter 5 - Discussion
• Problem solving (121a-b)
– What are the new opportunities for the business generated by the Internet?
– What are the new threats for the business generated by the Internet?
• Opposing forces (129a-b)
– State your opinions related to the negative impact on the society when
everyone is connect through the Internet.
• Security (133a-b)
– State the impacts on the society and business from the government
having an decryption method to decode everything over the Internet.
• Ethics (141a-b)
– State the impacts from the employee’s private usage of company’s
computer facility.
• Reflections (143a-b)
– How should you react properly from not getting lost from this Internet age?
Chapter 5 - Case Study
• Case 5-1 (148-149) Network Services:
questions 1, 3, 4, 5, 6, 9, and 10
Assignments
• Electronic Billing Payment System
• Computer System for College Freshman