Presentation is loading. Please wait.

Presentation is loading. Please wait.

Review Exam 1 Chapters 1 - 5.

Similar presentations


Presentation on theme: "Review Exam 1 Chapters 1 - 5."— Presentation transcript:

1 Review Exam 1 Chapters 1 - 5

2 Chapter 1 – MIS and You MIS, IS, and IT IS Components
Hardware Software Data Procedures People Information and Data Information Characteristics Accurate: cross check Timely: real time Relevant Just barely sufficient Worth its cost Moore’s Law Discussion and Case Study

3 Chapter 1 - Discussion Security: password and password etiquette (5a-b) Ethics: misdirected information use (11a-b)

4 Chapter 1 - Case Study Case 1-1 Computerizing the Ministry of foreign Affairs (20-21) Case 1-2 IRS Requirements Creep (21-22)

5 Chapter 2 Purpose of Information Systems
Information Systems Purposes Competitive Advantage Problem Definition Decision Making Products creation of barriers Establishing alliances Reducing costs Customer relationship management (CRM) system Knowledge management system (KMS) Manufacturing Quality-Control Information System Decision Making Dimension Transaction processing systems (TPS) Management information systems (MIS) Executive information systems (EIS) Discussion and Case Study

6 Chapter 2 - Discussion Security (27a-b) Ethics (29a-b)
Name the competitive advantages for a financial institution by implementing security system The cost of no security for a financial institute Ethics (29a-b) Social impact of the digital divide Responsibility for business and government Opposing forces (31a-b) Can a business survive without any IS? Egocentric vs. empathetic thinking (33a-b) How to apply this concept in developing and using IS?

7 Chapter 2 - Case Study Case study 2-1Microsoft Customer Support (41-42)

8 Chapter 3 – Hardware & Software
Computer Hardware Input, processing, output, storage, and communication Computer Data and Instruction Microsoft Windows: Intel instruction set by Intel Corporation Macintosh computers: PowerPC instruction set using Powerful PC processor CPU (Central Processing Unit) and memory Computer Performance The speed of main memory The speed and width of the data bus Software Operating system (OS) Application software Computer Virus Type Prevention

9 Chapter 3 - Discussion Security (53a-b) Opposing forces (57a-b)
How to enforce employees to follow the antivirus policy and procedure in any organization State your opinions related to the statement “the viruses are developed by the antivirus software vendor” Opposing forces (57a-b) State your opinions related to the statement “the new computer products are the conspiracy between hardware and software vendors to ripe off consumers” Ethics (61a-b) State your opinions about the major impacts in terms of social, entertainment, government, and business operations by implementing the TCG/NGSCB (Trusted Computing Group/Next Generation Secure Computing Base)

10 Chapter 3 - Case Study Case 3-1 (69-70) Wall Data IS Support: every one except 6 & 9 Case 3-2 (70-71) Dell Leverages the Internet: questions 1 & 2

11 Chapter 4 – Database Processing
Purpose of Database Components of Database System User, application, DBMS, and database Multi-user Processing Relational Database Design Entity-relationship Model Primary key, foreign key Relationship (dependent and independent) Cardinality Normalization Database Administration DBA and steering committee Database Security Firewall, OS and DBMS patches, physical security, logical security, logs and security emergency plan Discussion, Design, and Case Study

12 Chapter 4 - Discussion Ethics (81a-b) Opposing forces (97a-b)
What should the company do to avoid the situation at first place? What should the company do to properly handle Kelly’s case What should Kelly do to avoid the stated consequence after querying the database? What could Kelly do to save his career? Opposing forces (97a-b) What should the DBA of car dealer do to convince every salesperson to build and use a solid sales information database? Reflections (101a-b) What should the DBA of any organization to handle the changing requirements for a new database? What should the DBA of any organization to handle the new requirements for a existing database?

13 Chapter 4 - Relational Database Design
Given the following entities and their attributes Buyer (BuyerID, BuyerName) Owner (OwnerID, OwnerName) Property (PropertyID, PropertyAddres, OwnerID) Agent (AgentID, AgentName) Sales (SalesID, BuyerID, OwnerID, PropertyID, AgentID, Price, Date) Design a relational database Create primary key for every entity and the necessary foreign key Create an entity-relationship diagram

14 Chapter 4 - Case Study Assignment 22 (105)
Case 4-1 ( ): questions 1, 4, and 7 (add aircraft for 7) Case 4-2 ( ): questions 1 and 2

15 Chapter 5 - Telecommunication & Internet Technology
Network Concepts Protocol, wire, modem TCP/IP-OSI Architecture Application, transport, Internet, data link, physical Network Types LAN WAN Public Switched Data Network (frame relay, asynchronous transfer mode, and Ethernet) Virtual Private Network Network Comparison Internet Domain Name System IP Addressing Schemes Security

16 Chapter 5 - Discussion Problem solving (121a-b)
What are the new opportunities for the business generated by the Internet? What are the new threats for the business generated by the Internet? Opposing forces (129a-b) State your opinions related to the negative impact on the society when everyone is connect through the Internet. Security (133a-b) State the impacts on the society and business from the government having an decryption method to decode everything over the Internet. Ethics (141a-b) State the impacts from the employee’s private usage of company’s computer facility. Reflections (143a-b) How should you react properly from not getting lost from this Internet age?

17 Chapter 5 - Case Study Case 5-1 ( ) Network Services: questions 1, 3, 4, 5, 6, 9, and 10

18 Assignments Electronic Billing Payment System
Computer System for College Freshman


Download ppt "Review Exam 1 Chapters 1 - 5."

Similar presentations


Ads by Google