1 / 42

Review For Exam 1

Review For Exam 1. (September 12, 2016). BUS3500 - Abdou Illia, Fall 2016. Introduction to Information Systems. Summary Questions. P. I. O. Data versus Information. Data – raw facts that represent the characteristics of an event Example 1: Event: High temperature Data: 100 ° F

cameronw
Download Presentation

Review For Exam 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Review ForExam 1 (September 12, 2016) BUS3500 - Abdou Illia, Fall 2016

  2. Introduction to Information Systems

  3. Summary Questions

  4. P I O Data versus Information • Data – raw facts that represent the characteristics of an event • Example 1: • Event: High temperature • Data: 100° F • Example 2: • Event: Sale • Data: Sale’s date, item number, item description, etc. • Information – facts within a given context • The temperature today at noon in Times Square, NYC was 100° F • Monday’s total sales for item #0001 is $1200.00

  5. Information Systems • A set of interrelated information technologies that work together to collect, store, process, and distribute information • Major components of information systems • Hardware (physical parts of a computer or other computing devices) • Software (Instructions that tell hardware what to do) • Databases (Software that enables storage/retrieval of data) • Networks (Computing devices that communicate with each other) • People • Information technology (IT):Computer-based tool that people use to work with information and support the information and information-processing needs of an organization InformationTechnologies

  6. ROLES AND RESPONSIBILITIES IN IT • Information Technology is a relatively new functional area, having only been around formally for around 40 years • Recent IT strategic positions include: • Chief Information Officer (CIO) • Chief Technology Officer (CTO) • Chief Security Officer (CSO) • Chief Privacy Officer (CPO) • Chief Knowledge Officer (CKO)

  7. ROLES AND RESPONSIBILITIES IN IT • Chief Information Officer (CIO) • Oversees all uses of IT • Ensures the strategic alignment of IT with business goals and objectives • Chief Security Officer (CSO) • Responsible for ensuring the security of IT systems • Responsible for developing security policies and strategies • Responsible for controlling implementation of security policies and strategies • Chief Knowledge Officer (CKO) • Responsible for collecting, maintaining, and distributing the organization’s knowledge • Responsible for supervising the implementation of knowledge systems

  8. Administrative Information Systems • Transaction Processing Systems (TPS) • Basic business system that serves the operational level (analysts) in an organization • Office Automation Systems (OAS) • Systems designed to help office workers in doing their job. • Decision Support Systems (DSS) • Systems designed to support middle managers and business professionals during the decision-making process • Executive Information Systems (EIS) • Specialized DSS that help senior level executives make decisions.

  9. DSS structure • Designed to help middle managers make decisions • Major components • Data management subsystem • Internal and external data sources • Model management subsystem • Typically mathematical in nature • User interface • How the people interact with the DSS • Data visualization is the key • Text • Graphs • Charts UserInterface Model Management - Sensitivity Analysis -> What-if Analysis -> Goal-seeking Analysis Data Management - Transactional Data- Data warehouse- Business partners data- Economic data

  10. DSS’ Model Management Tools • Simulation is used to examine proposed solutions and their impact • Sensitivity analysis • Determine how changes in one part of the model influence other parts of the model • What-if analysis • Manipulate variables to see what would happen in given scenarios • Goal-seeking analysis • Work backward from desired outcome Determine monthly payment given various interest rates. Works backward from a given monthly payment to determine various loans that would give that payment.

  11. Example of rules IFfamily is albatross ANDcolor is white THENbird is laysan albatross. IFfamily is albatross ANDcolor is dark THENbird is black footed albatross Expert Systems Components • Knowledge base: database of the expertise, often in IF THEN rules. • Inference engine: derives recommendations from knowledge base and problem-specific data • User interface: controls the dialog between the user and the system • Explanation system: Explain the how and why of recommendations User Domain Expert UserInterface Expertise System Engineer InferenceEngine Knowledge Engineer Encoded expertise Knowledgebase ExplanationSystem - Knowledge engineer codify the human expert’s expertise into the systems’ knowledge base.- System engineer is the IT professional who develop the user interface, the inference engine, and the explanation system.

  12. Review Questions • Make sure you can answer the Week 1: Intro to Info Systems & Decision Making summary questions that were answered in class. A copy is posted to D2L.

  13. Hardware Technology

  14. Summary Questions

  15. Processing subsystem • Motherboard: chipset that all components connect to • Two major components in processing subsys. • CPU (Central Processing Unit) or Processor(s) • Primary Storage: • Random Access Memory (RAM) • Read Only Memory (ROM) CPU Buses that transfer data Primary Storage

  16. Processor Clock Instruction Control Unit Arithmetic Logic Unit Registers Central Processing Unit • Clock: generate time that synchronize other components • ICU: Fetches instructions from RAM • ALU: Execute instructions (arithmetic & logic operations) • Registers: Store control information, data, intermediate results

  17. Primary Storage • Computer’s memory stored on semiconductor chips • Two categories: • RAM (Random Access Memory) which is volatile • Synchronous Dynamic RAM (SDRAM) • Double Data Rate SDRAM or DDR SDRAM • ROM (Read-Only Memory) which is non-volatile • Capacity in Megabytes (MB) or Gigabytes (GB) • RAM holds running programs and the data they use • ROM contains critical programs such as those that boot the computer Primary Storage RAM Program Data ROM

  18. Front Side Bus and Northbridge CPU Front Side Bus RAM Northbridge(Memory Controller) AGP Video Card PCI bus Southbridge(Memory Controller) Real Time Clock USB Other devices • FSB: bi-directional data bus carrying data b/w CPU and Northbridge • FSB speed is measured in Hz; e.g. 800 MHz FSB

  19. Terminology • Dot pitch • Pixel • Screen resolution

  20. Review Questions • Make sure you can answer the Week 2 IT Infrastructure: Hardware summary questions that were answered in class. A copy is posted to D2L.

  21. Software

  22. Summary Questions In addition, make sure you can answer Software Review Questions answered in class. They are posted to the Review section of the course website.

  23. Relationship of software to hardware

  24. Main Types of Software • Application software • Programs that allow users to accomplish specific tasks • Examples • Word processing • Web browser • Tax preparation • Data management • Desktop publishing • E-mail • Groupware • Presentation graphics • Programming editors • Spreadsheet

  25. Operating Systems (OS) • Software platform on which other programs run • Provides a connection between application programs and the computer hardware • Major tasks • Starting the computer • Managing files • Keeping track of where files are located • Maintaining a table of file entries • Etc. • Managing Programs and Memory (RAM) • Sending programs to the CPU • Allocating primary storage (RAM) to programs • Controlling devices that programs requires • Ensuring security • Providing a user interface

  26. OS: Multiprogramming

  27. OS: Virtual Memory • A technique that “extends” primary memory (RAM) by using secondary storage devices • Needed when there is not enough RAM to hold programs

  28. Utility Software • Accomplish common tasks and maintenance jobs • Disk Defragmentation, Disk Optimization • Virus protection • Edit the Windows registry • Remove Web cookies from HDD • Encrypt data • File and data recovery • Spyware • Program Uninstaller

  29. Review Questions • Make sure you can answer the Week 2 IT Infrastructure: Software summary questions that were answered in class. A copy is posted to D2L.

  30. Database Systems

  31. Summary Questions In addition, make sure you can answer Database Review Questions answered in class. They are posted to D2L.

  32. Basic Concepts of Data Management Accounts table • Table • Two-dimensional structure composed of rows and columns • Field • Like a column in a spreadsheet • Field name • Like a column name in a spreadsheet • Examples: AccountID, Customer, Type, Balance • Field values • Actual data for the field • Record • Set of fields that describe an entity (a person, an account, etc.) • Primary key • A field, or group of fields, that uniquely identifies a record Each table has: • Fields • Records • 1 Primary key

  33. Basic Concepts in Data Management • A Primary key could be a single field like in this table • A Primary key could be a composite key, i.e. multiple fields

  34. Application 1 Application 2 Program 1 Program 2 Program 2 Program 1 File 1 File 1 File 1 File 1 File 2 File 2 File 2 File 2 File 3 File 3 File 3 File 3 Traditional File Systems • System of files that store groups of records used by a particular software application • Simple but with a cost • Inability to share data • Inadequate security • Difficulties in maintenance and expansion • Allows data duplication (e.g. redundancy)

  35. Traditional File System Anomalies • Insertion anomaly • Data needs to be entered more than once if located in multiple file systems • Modification anomaly • Redundant data in separate file systems • Inconsistent data in your system • Deletion anomaly • Failure to simultaneously delete all copies of redundant data • Deletion of critical data

  36. Application 1Program-1 Program-2 Application 2Program-1 Program-2 DBMS Database Management System (DBMS) • Combination of software and data for • Collecting, storing and managing data in a database environment. • A DBMS includes: • Database • Database engine (for accessing and modifying the DB content) • Data Manipulation Language

  37. Entity • An entity, sometimes called a table, could be • a person • a place • a thing • a transaction • an event

  38. Attributes • Also called fields or columns, Attributes are characteristics of an entity. • An entity identifier is the attribute that ensures that each instance of the entity is unique

  39. Types of attributes • There are several types of attributes, including: • Simple versus composite. • Single-valued versus multi-valued. • Stored versus derived. • Null-valued. • When creating a relational database, the attributes in the data model must be single-valued. Example: a customer with more than one phone number

  40. Relationships • The relationships stored in a database are between instances of entities. • One-to-One (1:1) • An instance of entity A can be related to only one instance of entity B • One-to-Many (1:M) • An instance of entity B can be related to many instances of entity A

  41. Relationships (cont) • The relational modelcannot handle Many-to-Many (M:M) relationships directly • It is limited to 1:1 and 1:M relationships • M:M relationships need to be replaced with a collection 1:M relationships

  42. Review Questions • Make sure you can answer the Database Review questions that were answered in class. A copy is posted to D2L.

More Related