ITMG
100 CHAPTER QUIZ REVIEW GUIDE
Chapter One – Introduction to Information Systems
-
Understand the process of becoming an informed user of your organization’s
information system.
-
Understand the changing role of the information systems department, homo
Conexus, and digital nomads.
-
Differentiate between data, information,
knowledge, and wisdom.
-
Know the 11 characteristics of quality information.
-
Define and differentiate between the terms of information technology,
information systems, computer-based systems and
application.
-
Differentiate between information systems components, IT personnel, and it
services. Know the different functional areas (pyramid figure from chapter
slide deck)
-
When considering the role of business managers in working with IS. It is
helpful to divide information systems into three types. Be able to name, describe, and
identify the three types of information systems.
-
Describe the six basic components of any computer-based information system.
-
Define and identify the terms, database, data warehouse, and big data.
-
How woud you distinguish the difference between e-business and e-commerce?
Which is larger B2B or B2C)?
-
Define and identify the difference between transaction processing,
management information systems, decision support systems, and enterprise
resource plaining systems.
-
What is knowledge management and what is it used for?
-
Identify three specific social issues associated with the use of information
systems.
Flatteners and Competitive Advantage Slides
-
Understand Friedman’s 10 Flatteners.
-
Understand the three stages of Globalization and how it is changing the
nature of the workforce.
-
Describe Porter’s competitive forces model and explain how IT/Internet has an impact
on each one.
-
Describe Porter’s value chain model and how it identifies specific
activities where they can use competitive strategies.
-
Be able to describe five strategies that companies can use to counter
Porter’s competitive forces and achieve competitive advantage in their
industries.
Chapter Two – Information Systems in the Organization
-
Understand the concept of business processes, and provide examples of
business processes in the functional area of an organization.
-
Differentiate between the terms business process reengineering
and business process improvement. What is meant by continuous
improvement?
-
What are the differences between effectiveness and efficiency?
-
What is the difference between a value chain and a supply chain?
-
What activities are encompassed by supply chain management?
-
Identify and describe the differences between the two types of innovation
discussed in the chapter.
-
What is outsourcing? What if offshoring?
-
What is meant by the soft side of implementing change? What is Leavitt’s
diamond? What is Lewin’s force field analysis? Diffusion of innovation
theory? Technology Acceptance Model? Lewin’s Change Model?
-
What does the CIO do in the organization?
-
What is meant by the term ‘shadow IT’?
Chapter Eight – Enterprise Systems
1.
Identify and describe the six basic transaction processing activities
performed by transaction processing systems.
2.
Define and describe what a transaction processing systems (TPS) is, its
purpose, and be able to provide an example.
3.
Define functional area information systems (FAIS), and be able to provide
an example of the support they provide for each functional area of the
organization.
4.
What the difference between a batch and online transaction processing.
5.
What is an enterprise system? Identify three different types.
6.
Identify advantages and drawbacks to implementing an ERP system.
7.
How do customer relationship management systems help organizations
achieve customer intimacy?
8.
What are four key business capabilities in CRM?
9.
Discuss the relationship between CRM and customer privacy.
10.
Distinguish between operational CRM systems and analytical CRM systems.
11.
Differentiate between customer-facing CRM applications and
customer-touching CRM applications.
12.
Define the term supply chain; describe the three components and the three
flows of a supply chain.
13.
Identify two major challenges in setting accurate inventory levels
throughout the supply chain.
14.
Describe what push and pull means in supply chains.
1.
Define the terms computer network, compare and contrast the
different network topology, and know the different types of networks.
2.
Describe the differences amount the three types of wired
communications media and discuss the main advantages/disadvantages of each type.
3.
Understand the two main network protocols, Ethernet and TCP-IP (includes
packet switching, client-server and peer-to-peer).
4.
Differentiate between the Internet and the World Wide Web. Discuss the
most common methods for accessing the Internet.
5.
What is an IP address, what is a URL?
6.
Discuss different types of wireless media communication.
7.
What is channel bandwidth?
8.
Should the Internet be regulated?
9.
What is Internet censorship?
10.
What is cloud computing? Identify three different ways to deploy.
- Identify the major
hardware components of a computer system.
- What is the hierarchy of
memory capacity?
- Describe the computer
schematic design
and the function of the central processing unit.
- What are three main ways of
improving performance and what is Moors law?
- How do you convert binary
to decimal?
1. What is the role of the operating system?
2. Identify and describe the five types of operating system interfaces
3. The Mac OS X supports dual booting. What is this and what benefits does it provide?
4. What is open-source software? What are the benefits and drawbacks for a business using open-source software?
5. What is the difference between freeware and open-source software?
- Identify the various behavioral actions
you can take to protect your information assets.
- Identify the various computer-based
actions you can take to protect your assets.
Chapter Thirteen – Cybercrime and Information Security
1. What are the
six reason why computer incidents are so prevalent. (or five factors that
contribute to the increasing vulnerability of information resources and be able
to provide a specific example of each factor.)
2. What is BYOD?
3. What is a
zero-day attack?
4. What is the
difference between human error and social engineering?
5. What are the
ten types of deliberate attacks?
6. What is the
difference between a black hat hacker and a cracker?
7. What are the
three risk mitigation strategies and be able to provide an example of each one.
8. Identify the
three major types of controls that organizations can use to protect their
information resource.
9. What is the
CAN-SPAM act? What is CAPTCHA?
10. What is
reasonable assurance?
11. What is the
intent of a security policy?
Chapter Fourteen – Ethical, Legal, and Social Issues of Information
Systems
- What are the four main
issues in ethical framework? What are Ethical considerations in decision
making?
- Describe privacy policy
guidelines and the four main components.
- What are the six Candidate
Ethical Principles and 4 tech trends that raise ethical issues?
- What is the First
Amendment? What is the Fourth Amendment?
- What is sexting?
- What is mobile crowd
sensing?
- What is metadata? How is it
used in cell phone data collection? What role does the Freedom Act play in
this?
- What is the purpose of the
Safe Harbor Framework and Privacy shield?