BUS206: Management Information Systems

Study Guides

The following study guide is meant to help you prepare for the final exam. This material is for your practice and review only. You will not be asked to turn in your responses to the questions and activities below. As you work through these study guides, take note of your confidence level with the material. Ask yourself if you feel comfortable with your grasp of these topics, and take the suggestions for resources to re-watch or re-read seriously before proceeding to the final exam.

For your convenience, Microsoft Word and PDF files of this study guide are linked below.

Unit 2: MIS Basics: Hardware, Software, Networking, and Security

2a: compare and contrast hardware and software

2a.1. Hardware is the physical component of computing and includes technology like the keyboard, mouse, monitor, hard drive, etc. In Chapter 2, youlooked at the hardware in a management information system. Without physical hardware, software cannot perform the function for which it is programmed.

A. Random Access Memory (RAM) is the working memory a computer uses to process software programs.

B. A hard disk is the physical device used to store data on a computer.

C. Explain the role of a motherboard in a computer. What is its function?

Prepare for the final exam by reviewing the sections for “Motherboard,” “Random-Access Memory,” “Hard Disk,” and “Removable Media” in Chapter 2 of Information Systems for Business and Beyond.

2a.2. Software is the second component of a management information system. Software is designed to perform a certain function and relies on the compatibility of the hardware to perform that function.

A. Software is dependent on hardware. Explain how outdated hardware affects software performance.

B. Utility software helps users modify a computer. Programming software is used to create new programs and applications.

C.Explain the role and purpose of ERP in business.

Refer to “Types of Software” and “Utility Software and Programming Software” in Chapter 3 of Information Systems for Business and Beyond for more information and details about the various types of software.

2b: identify the primary components of a computer and the functions they perform

2b.1. The basic components of a computer are the CPU, memory, circuit board, storage, and input and output devices. Every digital device uses the same type of components. The CPU is known as the brains of a device; it carries out the commands performed in software by returning a result to be acted upon.

A. Intel and Advanced Micro Devices (AMD) are the two main CPU manufacturers for most computers.

B. Network connections make it possible to transmit data between computer networks without the need for removable media.

C. Explain how Moore’s Law describes the processing power of computers.

Read the following sections in Chapter 2to refresh your memory about the various components of a computer: “Network Connection,” “Removable Media,” “Sidebar: Moore’s Law,” and “Processing Data: The CPU.”

2c: describe the two primary categories of software

2c.1. Software can be divided into two main categories: operating systems software and application software. Both types of software serve as interfaces between the user and the hardware.

A. Operating systems manage hardware resources, provide user interface components, and provide the platform for software applications.

B. List the most popular operating systems for personal computers.

2c.2. Application software provides a solution to a computer user’s need or goal. For example, Microsoft Word is a piece of application software for writing papers, letters, articles, and other forms of written text.

A. A killer applicationsis one that makesa person want to buy a device just to use that particular application.

B. Productivity software applications are business and workplace tools, such as the Microsoft Office suite of programs.

2c.3.Two subcategories of application software are utility software and programming software. Diagnostic applications and antivirus software are examples of utility software that help users fix their computer. Programming software, like compilers, is used to create new applications.

A. Operating systems contain utility software integrated into the operating system.

B. How is programming software useful to business?

Watch Dr. David Bourgeois’ video “The Software Component”again to make your understanding of operating systems and application software very concrete. Additionally, review the sections, “Types of Software,” “Operating Systems,” “Application Software,” “The Killer App,” “Productivity Software,” and “Utility Software and Programming Software” from Chapter 3for a deeper look at the two main types of software.

2d: describe the advantages and disadvantages of cloud computing for companies

2d.1. Before the invention of cloud computing, software had to be installed on a computer either from a disk or file download. In many cases, purchased software was limited to a single installation per license. With the traditional Microsoft Office suite, you can only install one instance of the suite of programs on one device, but with the cloud-based Office 365, you can run the suite on up to five devices for one monthly subscription rate.

The cloud consists of online applications, services, and data storage. Cloud service providers maintain giant server farms with massive amounts of storage, all connected through Internet protocols.

A. Cloud computing saves businesses money because service providers absorb the cost to purchase and maintain the hardware components.

B. The cloud offers users access to all their data through the Internet from any connected device.

C. Security is still a main concern for users since information is trusted to a service provider.

2d.2. Private clouds help relieve some of the skepticism around cloud computing. Private clouds are specific sections of server space set aside for an organization through the service provider.

A. An organization has complete control over their data with a private cloud.

B. List some of the disadvantages a business might see from a private cloud.

2d.3. Virtualization is one technology that is used as part of cloud computing. Virtualization involves creating “virtual machines” that can connect to the Internet or exist on a closed network. With the use of virtualization, a single computer can be used to perform the functions of multiple computers with multiple operating systems.

A. A virtual computer is called a “virtual machine” (VM).

B. What are some of the benefits of virtualization?

Read more about virtualization from VMware. To prepare for the final exam, consider how familiar you are with the content about “Using a Private Cloud” and “Virtualization” inChapter 3.

2e: define the term open-source and identify its primary characteristics

2e.1. Open source software is the result of many programmers who create and share programs they build with solutions they have discovered. This allows open source programmers to develop innovative programs and fix errors.

A. Linux is a version of the Unix operating system that is used on large minicomputers and serves as an example of open source software.

B. Describe some of the advantages of open source software over closed source software.

Refer to Chapter 3 sections “Operating Systems,” “Software Creation,” and “Open source software” for a deeper look at open source software. Make sure to read the last paragraph under the “Operating Systems” sub-heading for an overview of the Linux operating system.

2f: identify the types of networks and their general functions

2f.1. Organizational networking consists of four main types of networks: LAN/WAN, Client-Server, Intranet, and Extranet. Each of these networks serve a specific role to organizations to help them reach out to their customers and perform daily operations.

A. Wireless networking is one way people can stay connected to the Internet without a hard wired connection to the Internet.

B. How have Bluetooth and VoIP technology changed the world of business communications?

Review “Wireless Networking,” “Bluetooth,” “VoIP”, and the four subsections under “Organizational Networking” in Chapter 5 of the textbook for a review of the types of networks and networking available for organizations to do business.

2g: identify the information security triad

2g.1. Confidentiality, integrity, and availability are the three components that make up the information security triad. Confidentiality ensures access to information is restricted to those who are allowed to view it. Integrity is the assurance that the information has not been changed and represents what it is intended to represent. Availability means that information can be accessed and modified by those authorized to do so.

A. Federal law requires universities to restrict access to student information.

B. Integrity ensures only trusted individuals have access to information.

C. Authorized individuals must be able to gain access to information when they need it, this is the availability of information.

Re-read the section “Confidentiality, Integrity, Availability (CIA)” in Chapter 6 of Information Systems for Business and Beyond for a review of the security triad. Watch the video “NCMCO Instructor Series: CIA Triad” again to prepare for the final exam.

2h: describe the tools used to secure information technologies

2h.1. In order to ensure the components of the security triad can be integrated into a management information system, various security tools should be used to ensure the overall information security of the system is in place. Authentication, access control, and encryption tools are main categories of information security tools.

A. Once authentication and access control are established, encryption is used to securely transmit information over the Internet.

B. Describe the three factors of authentication.

C. What are the two primary types of access control?

If these tasks were difficult for you, you might like to revisit the three subsections under “Tools for Information Security” in Chapter 6 before you attempt the final exam.

2h.2. Backups, firewalls, and intrusion detection systems are also essential tools in information security. Backup plans help protect information in the event of corrupted, deleted, or lost files due to power loss or network intrusion.

A. Backup data can be stored on a separate part of the network, on separate hard drives, or on the cloud.

B. Firewalls are devices connected to the network and filter packets based on rules to support the security triad.

C. An Intrusion Detection System monitors the network for certain activity and sends an alert to security personnel of suspicious traffic going over a network.

In Chapter 6, re-visit the sections on “Backups”, “Firewalls”, and “Intrusion Detection Systems.”

2h.3. Physical security is just as important as network security. Organizations should implement the best layers of physical security possible. Physical security includes the security of physical hardware and networking components on a network.

A. A locked door is the first step to physical security. The main building doors and server room doors should have locks on them.

B. Security cameras serve as a deterrent against break-ins.

C. Employees should be trained to secure their equipment while at home and work.

Read the sections “Physical Security” and “Security Policies” in Chapter 6 for more details.

2h.4. Personal information security helps protect individuals to secure their computing technologies. Individuals can take several steps to help protect their information and physical devices from being compromised.

A. Software should be patched as often as possible. These patches include security updates that can protect data against new security threats.

B. Antivirus software helps protect software against malware, spyware, viruses, worms, and other malicious intent on the Internet.

C. Secure accounts with two-factor authentication so nobody else can log into your account without your consent.

Read what some of your fellow students have said in the Personal Information Security Discussion to enhance your knowledge by visiting the Discourse discussion forum. Read the section on “Personal Information Security” in Chapter 6 to learn more steps to take in personal information security.

Unit 2 Vocabulary List

This vocabulary list includes terms that might help you answer some of the review items above and some terms you should be familiar with to be successful in completing the final exam for the course.

Application software

Availability

Backups

Circuit board

Client-server

Confidentiality

CPU

Enterprise Resource Planning

Extranet

Firewalls

Hard disk

Integrity

Intranet

Intrusion detection systems

LAN/WAN

Motherboard

Open-source software

Operating Systems

Personal information security

Physical security

Productivity software

Programming software

Random Access Memory

Removable media

Utility software

Virtualization