1 / 31

Review For Exam 1

Review For Exam 1. (January 28, 2009). BUS3500 - Abdou Illia, Spring 2008. Introduction to Information Systems. Summary Questions. P. I. O. Data versus Information. Data – raw facts that represent the characteristics of an event Example 1: Event: High temperature Data: 100 ° F

zena
Download Presentation

Review For Exam 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Review ForExam 1 (January 28, 2009) BUS3500 - Abdou Illia, Spring 2008

  2. Introduction to Information Systems

  3. Summary Questions

  4. P I O Data versus Information • Data – raw facts that represent the characteristics of an event • Example 1: • Event: High temperature • Data: 100° F • Example 2: • Event: Sale • Data: Sale’s date, item number, item description, etc. • Information – facts within a given context • The temperature today at noon in Times Square, NYC was 100° F • Monday’s total sales for item #0001 is $1200.00

  5. Information Systems • A set of interrelated information technologies that work together to collect, store, process, and distribute information • Major components of information systems • Hardware (physical parts of a computer or other computing devices) • Software (Instructions that tell hardware what to do) • Databases (Software that enables storage/retrieval of data) • Networks (Computing devices that communicate with each other) • People • Information technology (IT):Computer-based tool that people use to work with information and support the information and information-processing needs of an organization InformationTechnologies

  6. ROLES AND RESPONSIBILITIES IN IT • Information Technology is a relatively new functional area, having only been around formally for around 40 years • Recent IT strategic positions include: • Chief Information Officer (CIO) • Chief Technology Officer (CTO) • Chief Security Officer (CSO) • Chief Privacy Officer (CPO) • Chief Knowledge Officer (CKO)

  7. ROLES AND RESPONSIBILITIES IN IT • Chief Information Officer (CIO) • Oversees all uses of IT • Ensures the strategic alignment of IT with business goals and objectives • Chief Security Officer (CSO) • Responsible for ensuring the security of IT systems • Responsible for developing security policies and strategies • Responsible for controlling implementation of security policies and strategies • Chief Knowledge Officer (CKO) • Responsible for collecting, maintaining, and distributing the organization’s knowledge • Responsible for supervising the implementation of knowledge systems

  8. Administrative Information Systems • Transaction Processing Systems (TPS) • Basic business system that serves the operational level (analysts) in an organization • Office Automation Systems (OAS) • Systems designed to help office workers in doing their job. • Decision Support Systems (DSS) • Systems designed to support middle managers and business professionals during the decision-making process • Executive Information Systems (EIS) • Specialized DSS that help senior level executives make decisions.

  9. DSS structure • Designed to help middle managers make decisions • Major components • Data management subsystem • Internal and external data sources • Model management subsystem • Typically mathematical in nature • User interface • How the people interact with the DSS • Data visualization is the key • Text • Graphs • Charts UserInterface Model Management - Sensitivity Analysis -> What-if Analysis -> Goal-seeking Analysis Data Management - Transactional Data- Data warehouse- Business partners data- Economic data

  10. DSS’ Model Management Tools • Simulation is used to examine proposed solutions and their impact • Sensitivity analysis • Determine how changes in one part of the model influence other parts of the model • What-if analysis • Manipulate variables to see what would happen in given scenarios • Goal-seeking analysis • Work backward from desired outcome Determine monthly payment given various interest rates. Works backward from a given monthly payment to determine various loans that would give that payment.

  11. Example of rules IFfamily is albatross ANDcolor is white THENbird is laysan albatross. IFfamily is albatross ANDcolor is dark THENbird is black footed albatross Expert Systems Components • Knowledge base: database of the expertise, often in IF THEN rules. • Inference engine: derives recommendations from knowledge base and problem-specific data • User interface: controls the dialog between the user and the system • Explanation system: Explain the how and why of recommendations User Domain Expert UserInterface Expertise System Engineer InferenceEngine Knowledge Engineer Encoded expertise Knowledgebase ExplanationSystem - Knowledge engineer codify the human expert’s expertise into the systems’ knowledge base.- System engineer is the IT professional who develop the user interface, the inference engine, and the explanation system.

  12. Hardware Technology

  13. Summary Questions

  14. Processing subsystem • Motherboard: chipset that all components connect to • Two major components in processing subsys. • CPU (Central Processing Unit) or Processor(s) • Primary Storage: • Random Access Memory (RAM) • Read Only Memory (ROM) CPU Busses that transfer data Primary Storage

  15. Processor Clock Instruction Control Unit Arithmetic Logic Unit Registers Central Processing Unit • Clock: generate time that synchronize other components • ICU: Fetches instructions from RAM • ALU: Execute instructions (arithmetic & logic operations) • Registers: Store control information, data, intermediate results

  16. Primary Storage • Computer’s memory stored on semiconductor chips • Two categories: • RAM (Random Access Memory) which is volatile • Synchronous Dynamic RAM (SDRAM) • Double Data Rate SDRAM or DDR SDRAM • ROM (Read-Only Memory) which is non-volatile • Capacity in Megabytes (MB) or Gigabytes (GB) • RAM holds running programs and the data they use • ROM contains critical programs such as those that boot the computer Primary Storage RAM Program Data ROM

  17. Front Side Bus and Northbridge CPU Front Side Bus RAM Northbridge(Memory Controller) AGP Video Card PCI bus Southbridge(Memory Controller) Real Time Clock USB Other devices • FSB: bi-directional data bus carrying data b/w CPU and Northbridge • FSB speed is measured in Hz; e.g. 800 MHz FSB

  18. Terminology • Dot pitch • Pixel • Screen resolution

  19. Make sure you can answer Hardware Review Questions answered in class. They are posted to the Review section of the course website.

  20. Software

  21. Summary Questions In addition, make sure you can answer Software Review Questions answered in class. They are posted to the Review section of the course website.

  22. Relationship of software to hardware

  23. Main Types of Software • Application software • Programs that allow users to accomplish specific tasks • Examples • Word processing • Web browser • Tax preparation • Data management • Desktop publishing • E-mail • Groupware • Presentation graphics • Programming editors • Spreadsheet

  24. Operating Systems (OS) • Software platform on which other programs run • Provides a connection between application programs and the computer hardware • Major tasks • Starting the computer • Managing files • Keeping track of where files are located • Maintaining a table of file entries • Etc. • Managing Programs and Memory (RAM) • Sending programs to the CPU • Allocating primary storage (RAM) to programs • Controlling devices that programs requires • Ensuring security • Providing a user interface

  25. OS: Multiprogramming

  26. OS: Virtual Memory • A technique that “extends” primary memory (RAM) by using secondary storage devices • Needed when there is not enough RAM to hold programs

  27. Utility Software • Accomplish common tasks and maintenance jobs • Disk Defragmentation, Disk Optimization • Virus protection • Edit the Windows registry • Remove Web cookies from HDD • Encrypt data • File and data recovery • Spyware • Program Uninstaller

  28. Database Systems

  29. Summary Questions In addition, make sure you can answer Hardware Review Questions answered in class. They are posted to the Review section of the course website.

  30. Basic Concepts of Data Management Accounts table • Table • Two-dimensional structure composed of rows and columns • Field • Like a column in a spreadsheet • Field name • Like a column name in a spreadsheet • Examples: AccountID, Customer, Type, Balance • Field values • Actual data for the field • Record • Set of fields that describe an entity (a person, an account, etc.) • Primary key • A field, or group of fields, that uniquely identifies a record Each table has: • Fields • Records • 1 Primary key

  31. Basic Concepts in Data Management • A Primary key could be a single field like in this table • A Primary key could be a composite key, i.e. multiple fields

More Related