Exam 1 Review
MIS 3003
Fall 2011
Chapters 1, 2, 4, 8, Mod A, and IT Ethics
(Note: This review sheet is designed to summarize the terminology covered in the above stated chapters and not to represent all material covered in the lectures.)
Chapter 1 and Mod A
- Information Age
- Knowledge Worker
- MIS
- Telecommuting
- Information, IT, and people
- Data
- Information
- Business Intelligence
- Knowledge
- Dimensions of Information
- Time, Location, Form, Validity
- Upward, Downward, Horizontal, Outward/Inward flow of info.
- Internal, External, Objective, Subjective info.
- Information Granularity
- Strategic, Tactical, Operational Mgmt Levels
- Technology-literate knowledge worker
- Information-literate knowledge worker
- Ethics
- Information Technology
- Hardware
- 5 C’s: Capture, Convey, Create, Cradle, Communicate
- Input, Output, CPU, RAM, Storage, Telecommunications, Connecting
- Software
- Application software
- Operating system software
- Utility software
- Decentralized Computing
- Shared Information
- Mobile Computing
- Online Analytical Processing (OLAP)
- Online Transaction Processing (OLTP)
- Transaction Processing System (TPS)
- Customer Integrated System (CIS) or Customer Self-Service System
- Management Information System (MIS)
- Periodic, Summarized, Exception, Comparative, Ad Hoc Reports
- Workgroup Support System (WSS) or Collaboration System
- Decision Support System (DSS)
- Artificial Intelligence (AI)
- Executive Information System (EIS)
Chapter 2
- SCM system
- Inter-modal transportation
- RFID (Radio frequency identification)
- CRM system
- Multi-channel service delivery
- Sales-force automation (SFA) systems
- E-Collaboration
- Integrated Collaboration Environments (ICE)
- Knowledge management (KM) system
- Social networking site and system
- E-learning tools
- Information collaboration
- IT Culture
- Enterprise Resource Planning (ERP)
IT Ethics
- Moral
- Ethic
- Law
- PAPA (Privacy, Accuracy, Property, Access)
Chapter 8
- Intellectual Property
- Copyright
- Fair Use Doctrine
- Pirated Software
- Key logger (key trapper) software
- Screen capture programs
- Hardware key logger
- Event Data Recorders (EDR)
- Identity Theft
- Phishing
- Pharming
- Cyberslacking
- Cookie
- Spam
- Adware / Trojan Horse Software
- Spyware/Sneakware
- Web log
- Clickstream
- Anonymous Web browsing (AWB)
- Hacker
- Computer Virus
- Worm
- Denial-of-service attack
- Anti-virus software
- Anti-spyware / -adware software
- Spam protection software
- Anti-phishing software
- Firewall
- Biometrics
- Encryption
Chapter 4
- Phases of Decision Making – Intelligence, Design, Choice, Implementation
- Unstructured/nonstructured Decision
- Structured Decision
- Semi-structured Decision
- Recurring
- Nonrecurring
- DSS
- Data mgmt
- Model mgmt
- User interface mgmt
- Geographic information system (GIS)
- Artificial Intelligence (AI)
- Expert System (ES)
- People
- Domain expert
- Knowledge engineer
- Knowledge worker
- Information
- Domain expertise
- “Why” information
- problem facts
- IT
- Knowledge base
- Inference engine
- Knowledge acquisition
- User interface
- Explanation module
- Neural Network (NN)
- Fuzzy Logic
- Genetic Algorithm (GA)
- Intelligent Agent: four types