ITMG 100 CHAPTER QUIZ REVIEW GUIDE

Chapter One – Introduction to Information Systems

  1. Understand the process of becoming an informed user of your organization’s information system.
  2. Understand the changing role of the information systems department, homo Conexus, and digital nomads.
  3. Differentiate between data, information, knowledge, and wisdom.
  4. Know the 11 characteristics of quality information.
  5. Define and differentiate between the terms of information technology, information systems, computer-based systems and application.
  6. Differentiate between information systems components, IT personnel, and it services. Know the different functional areas (pyramid figure from chapter slide deck)
  7. When considering the role of business managers in working with IS. It is helpful to divide information systems into three types. Be able to name, describe, and identify the three types of information systems.
  8. Describe the six basic components of any computer-based information system.
  9. Define and identify the terms, database, data warehouse, and big data.
  10. How woud you distinguish the difference between e-business and e-commerce? Which is larger B2B or B2C)?
  11. Define and identify the difference between transaction processing, management information systems, decision support systems, and enterprise resource plaining systems.
  12. What is knowledge management and what is it used for?
  13. Identify three specific social issues associated with the use of information systems.

 

Flatteners and Competitive Advantage Slides

  1. Understand Friedman’s 10 Flatteners.
  2. Understand the three stages of Globalization and how it is changing the nature of the workforce.
  3. Describe Porter’s competitive forces model and explain how IT/Internet has an impact on each one.
  4. Describe Porter’s value chain model and how it identifies specific activities where they can use competitive strategies.
  5. Be able to describe five strategies that companies can use to counter Porter’s competitive forces and achieve competitive advantage in their industries.

 

Chapter Two – Information Systems in the Organization

  1. Understand the concept of business processes, and provide examples of business processes in the functional area of an organization.
  2. Differentiate between the terms business process reengineering and business process improvement. What is meant by continuous improvement?
  3. What are the differences between effectiveness and efficiency?
  4. What is the difference between a value chain and a supply chain?
  5. What activities are encompassed by supply chain management?
  6. Identify and describe the differences between the two types of innovation discussed in the chapter.
  7. What is outsourcing? What if offshoring?
  8. What is meant by the soft side of implementing change? What is Leavitt’s diamond? What is Lewin’s force field analysis? Diffusion of innovation theory? Technology Acceptance Model? Lewin’s Change Model?
  9. What does the CIO do in the organization?
  10. What is meant by the term ‘shadow IT’?


Chapter Eight – Enterprise Systems

1.      Identify and describe the six basic transaction processing activities performed by transaction processing systems.

2.      Define and describe what a transaction processing systems (TPS) is, its purpose, and be able to provide an example.

3.      Define functional area information systems (FAIS), and be able to provide an example of the support they provide for each functional area of the organization.

4.      What the difference between a batch and online transaction processing.

5.      What is an enterprise system? Identify three different types.

6.      Identify advantages and drawbacks to implementing an ERP system.

7.      How do customer relationship management systems help organizations achieve customer intimacy?

8.      What are four key business capabilities in CRM?

9.   Discuss the relationship between CRM and customer privacy.

10.   Distinguish between operational CRM systems and analytical CRM systems. 

11.   Differentiate between customer-facing CRM applications and customer-touching CRM applications.

12.   Define the term supply chain; describe the three components and the three flows of a supply chain.

13.   Identify two major challenges in setting accurate inventory levels throughout the supply chain.

14.   Describe what push and pull means in supply chains.


Chapter Six – Networks

1.         Define the terms computer network,  compare and contrast the different network topology, and know the different types of networks.

2.         Describe the differences amount the three types of wired communications media and discuss the main advantages/disadvantages of each type.

3.         Understand the two main network protocols, Ethernet and TCP-IP (includes packet switching, client-server and peer-to-peer).

4.         Differentiate between the Internet and the World Wide Web. Discuss the most common methods for accessing the Internet.

5.         What is an IP address, what is a URL?

6.         Discuss different types of wireless media communication.

7.         What is channel bandwidth?

8.         Should the Internet be regulated?

9.         What is Internet censorship?

10.      What is cloud computing? Identify three different ways to deploy.

Chapter Three - Hardware

  1. Identify the major hardware components of a computer system.
  2. What is the hierarchy of memory capacity?
  3. Describe the computer schematic design and the function of the central processing unit.
  4. What are three main ways of improving performance and what is Moors law?
  5. How do you convert binary to decimal?

 

Chapter Two - Software

    1. What is the role of the operating system?
    
    2. Identify and describe the five types of operating system interfaces
    3. The Mac OS X supports dual booting. What is this and what benefits does it provide?
    
    4. What is open-source software? What are the benefits and drawbacks for a business using open-source software?
    5. What is the difference between freeware and open-source software?

 

Protecting Your Assets

  1. Identify the various behavioral actions you can take to protect your information assets.
  2. Identify the various computer-based actions you can take to protect your assets.

 

Chapter Thirteen – Cybercrime and Information Security

1.      What are the six reason why computer incidents are so prevalent. (or five factors that contribute to the increasing vulnerability of information resources and be able to provide a specific example of each factor.)

2.      What is BYOD?

3.      What is a zero-day attack?

4.      What is the difference between human error and social engineering?

5.      What are the ten types of deliberate attacks?

6.      What is the difference between a black hat hacker and a cracker?

7.      What are the three risk mitigation strategies and be able to provide an example of each one.

8.      Identify the three major types of controls that organizations can use to protect their information resource.

9.       What is the CAN-SPAM act? What is CAPTCHA?

10.   What is reasonable assurance?

11.   What is the intent of a security policy?

 

Chapter Fourteen – Ethical, Legal, and Social Issues of Information Systems

  1. What are the four main issues in ethical framework? What are Ethical considerations in decision making?
  2. Describe privacy policy guidelines and the four main components.
  3. What are the six Candidate Ethical Principles and 4 tech trends that raise ethical issues?
  4. What is the First Amendment? What is the Fourth Amendment?
  5. What is sexting?
  6. What is mobile crowd sensing?
  7. What is metadata? How is it used in cell phone data collection? What role does the Freedom Act play in this?
  8. What is the purpose of the Safe Harbor Framework and Privacy shield?