mis-2101-midterm-study-guide
3 Pages

mis-2101-midterm-study-guide

Course Number: MIS 2101, Fall 2009

College/University: Temple

Word Count: 550

Rating:

Document Preview

MIS 2101 Midterm Study Guide Spring 2009 The exam will consist of all the topics that we discussed in the class, as well as the questions posted on the discussion board under Question Bank. Here is the list of relevant topics. While I have tried to make this list as comprehensive as possible, I may have inadvertently missed a topic or two. Therefore, there may be items that are not included on this list which may...

Unformatted Document Excerpt
Coursehero >> Pennsylvania >> Temple >> MIS 2101

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

2101 MIS Midterm Study Guide Spring 2009 The exam will consist of all the topics that we discussed in the class, as well as the questions posted on the discussion board under Question Bank. Here is the list of relevant topics. While I have tried to make this list as comprehensive as possible, I may have inadvertently missed a topic or two. Therefore, there may be items that are not included on this list which may be on the midterm. Week 1 Role of IT in Organizations and Society Knowledge Society Key Definitions Drivers of Information Age Moore's Law IT in Organizations o IT Personnel and CIO o Careers in IT Nicholas Carr's "IT Doesn't Matter" Article What is the overall idea presented by Carr in the article? What are the arguments for and against this idea? Dual Nature of IS o Failures and Success Stories Week 2 Friedman's "The World is Flat" Video and Discussion What is the overall idea? What were the major stages of globalization? What are the flatteners? Be ready to discuss examples and implications. What are some steps that can be taken to assure competitiveness in a flattened world? Challenges to Globalization Demoographic Political Geoeconomic Cultural Different Globalization Strategies and Implications for IT o Multidomestic o Global o Transnational Week 3 Electronic Commerce Common Types of Electronic Commerce (B2B, B2C, etc) What are they? Be ready to give specific business examples of each type. Be ready to give examples related to the key concepts of electronic commerce Mass customization Integration Collaboration Transaction support Ecommerce Revenue Models Search Engine Marketing and Search Engine Optimization Trends in E-commerce Online Social Communities Mobile Commerce is What Digital Rights Management (DRM) Related to E-Auction Fraud, what are some of the key types? (for example: bid luring, bid shielding) Internet taxation --- What are the arguments for and against? What is net neutrality? Weeks 4 Internal Information Systems Levels of an Organization Type of Decisions they make and Information needed Transaction Processing Systems, Management Information Systems, and Executive Information Systems --- How do they differ? Who uses them? What are they used for? (Understand the examples we discussed) Where do they get their data? What do they do? Which requires the most control and security? Which requires the weakest (least) control and security? Which has the greatest detail? Which has the least detail? Digital Dashboard Other concepts: Decision Support Systems What-if Analysis Text Mining Visualization and Data Mining Intelligent Systems Groupware Knowledge Management Systems Week 5 Business Processes Definition Need for Improvement BPR Systems Development Life Cycle (SDLC) Phases What...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Temple - CIS - 542
Stream Input/OutputThe header file <iostream> includes definitions for the classes*: ios / the base class streambuf / defines the buffer istream / input ostream / output It also includes definitions of the following objects extern istream cin extern
Temple - CIS - 166
Module #19 Probability6.2 Probability Theory Longin Jan Latecki Temple UniversitySlides for a Course Based on the Text Discrete Mathematics & Its Applications (6th Edition) Kenneth H. Rosen based on slides by Michael P. Frank and Andrew W. Moore
Temple - PSYCH - 522524
Chapter 10 One-Factor Repeated Measures ANOVAPage Introduction to Repeated Measures 1. Types of repeated measures designs 2. Advantages and disadvantages 3. The paired t-test 4. Analyzing paired data One-Factor Repeated Measures ANOVA 5. An initial
Temple - CIS - 616
Chapter 4: SQLs Basic Structure s Set Operations s Aggregate Functions s Null Values s Nested Subqueries s Derived Relations s Views s Modification of the Database s Joined Relations s Data Definition Language s Embedded SQL, ODBC and JDBCDatabase
Temple - CIS - 616
Chapter 3: Relational Models Structure of Relational Databases s Relational Algebra s Tuple Relational Calculus s Domain Relational Calculus s Extended Relational-Algebra-Operations s Modification of the Database s Views08:10 AM 08:10 AMDatabase
Temple - CIS - 350
Cis 350, 2003 QUIZ #5 (Total: 10 points) NAME:(2 points) Given a 1 dimensional function F: [0. 2 ] , which of the following statements is true ? F can never be constructed by the Fourier Synthesis, since only sine functions can be synthesized F
U. Houston - MATH - 1330
Exercise Set 5.2: Graphs of the Sine and Cosine FunctionsFor each of the following functions, (a) Find the period. (b) Find the amplitude. 1.4 y 3 2 1 -6 -4 -2 -1 -2 2 4 6 8 10 12x6.8 y 6 4 2x--2/3-/3 -2 -4/32/3Answer the followin
U. Houston - MATH - 1330
Exercise Set 5.3: Graphs of the Tangent, Cotangent, Secant, and Cosecant FunctionsAnswer the following. 1. (a) Use your calculator to complete the following chart. Round to the nearest hundredth. If a value is undefined, state "Undefined." Notice th
U. Houston - MATH - 1330
Exercise Set 3.4: Exponential and Logarithmic Equations and InequalitiesSolve each of the following equations. (a) Solve for x. (Note: Further simplification may occur in step (b).) Write the answer in terms of natural logarithms, unless no logarith
Temple - CIS - 307
Rules of Thumb in Data EngineeringJim Gray, Prashant ShenoyDecember 1999 Revised March 2000Technical Report MS-TR-99-100Microsoft Research Advanced Technology Division Microsoft Corporation One Microsoft WayRedmond, WA. 98052 2000 IEEE. Per
Temple - CIS - 307
Fuss, Futexes and Furwocks: Fast Userlevel Locking in LinuxHubertus Franke IBM Thomas J. Watson Research Centerfrankeh@watson.ibm.comRusty Russell IBM Linux Technology Centerrusty@rustcorp.com.auMatthew Kirkwoodmatthew@hairy.beasts.orgAbstra
Temple - CIS - 307
Futexes Are TrickyUlrich Drepper Red Hat, Inc.drepper@redhat.comDecember 11, 2005 AbstractStarting with early version of the 2.5 series, the Linux kernel contains a light-weight method for process synchronization. It is used in the modern thread
Temple - CIS - 307
cd Results & make summary percent 2>/dev/null | more L M B E N C H 1 . 0 S U M M A R Y - Processor, Processes - times in microseconds --Host OS Mhz Null Null
Temple - CIS - 307
The clock resolution is 0 seconds, 976562 nanosecondsDELTA = 4 millisecondsDELTA = 3 millisecondsDELTA = 3 millisecondsDELTA = 3 millisecondsDELTA = 3 millisecondsDELTA = 3 millisecondsDELTA = 4 millisecondsDELTA = 3 millisecondsDELTA = 3 m
Temple - CIS - 307
SO_BROADCAST: default = offSO_DEBUG: default = offSO_DONTROUTE: default = offSO_ERROR: default = 0SO_KEEPALIVE: default = offSO_LINGER: default = l_onoff = 0, l_linger = 0SO_OOBINLINE: default = offSO_RCVBUF: default = 32768SO_SNDBUF: default
Temple - CIS - 307
BOA1234567 155.247.71.60 7890BOA7654321 155.247.177.205 12876BOA0123456 155.247.190.207 8901
Temple - CIS - 307
155111112040123 Smith, John 98765432324222225634182 Donovan, Samuel 765890423333339167987 Brown, Josephine 5487650128555725636321 Samuelson, Frank
Temple - CIS - 307
155111112040123 BOA1234567324222225634182 BOA1234567423333339167987 BOA1234567712444349274565 BOA7654321128555725636321 BOA1234567356666698734753 BOA1234567677777539872357 BOA1234567583888885107793 BOA7654321683999999700864 BOA12345670987654
Temple - CIS - 307
DELTA = 2930DELTA = 12695DELTA = 1955DELTA = 2930DELTA = 1953DELTA = 2930DELTA = 2930DELTA = 2926DELTA = 3911DELTA = 2930DELTA = 2926DELTA = 2933DELTA = 3906DELTA = 3902DELTA = 2932DELTA = 2930DELTA = 3902DELTA = 2929DELTA = 2930DE
Temple - CIS - 307
Archive-name: os-research/part3Version: $Revision: 1.3 $Posting-Frequency: monthlyLast-Modified: Tue Aug 13 21:03:20 1996URL: http:/www.serpentine.com/~bos/os-faq/Answers to frequently asked questions for comp.os.research: part 3 of 3
Temple - CIS - 307
// ORBIX Example/ Documentation on ORBIX and more information on this example/ is at / http:/www.cis.umassd.edu/~aschaefer/orbixdoc// or at/ http:/www.apl.jhu.edu/~ded/doc// For general information about CORBA and OMG/ http:/www.om
Temple - CIS - 307
Protocol Analysis using Lanwatch (by Dr. Robert Stafford)The following is a log of an FTP session between shirley.cis.temple.eduand cs.orst.edu. The characters I typed are underlined.shirley> ftp cs.ors
Temple - CIS - 307
Some Unix Stuff (assumes thunder account but works on astro or nimbus as well)(by Dr. Robert Stafford) 1. Famous unix directories and files include the following: / - called "slash", the top level directory /vmu
Temple - CIS - 307
Introduction To Networks (by Dr. Robert Stafford)1. Computers are typically connected by communication channels that provide "speed of light" communication between computers attached to the chan
Temple - CIS - 307
Remote method invocation from Tanenbaum. 1. Compile all .java files 2. Start the registryOn Unix:rmiregistry &On Windows:start rmiregistry 3. Create an instance of the remote objectjava RemoteDateImpl 4. Reference the remote o
U. Houston - MATH - 3336
MATH 3336, DISCRETE MATHEMATICS SPRING 2007 CONTENT and EXAM SCHEDULEAny changes in dates and sections will be announced in class a week in advance.Chapter 1. The Foundations: Logic and Proofs 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Propositional logic Propos
U. Houston - M - 1310
Thursday, April 10, 2008 2:31 PM1310Review020 Page 1
U. Houston - ITEC - 3365
/* Primary Key Creation using Alter */Use Demo_DatabaseAlter Table Customer With Nocheck Add Constraint PK_Customer Primary Key Clustered (Customer_ID) On [Primary]GoAlter Table Order_Invoice With Nocheck Add Constraint PK_
Temple - CHAPTERS - 1100
Temple - CHAPTERS - 1100
Temple - CIS - 525
Text Categorization With Support Vector Machines: Learning With Many Relevant FeaturesBy Thornsten Joachims Presented By Meghneel Gore Goal of Text CategorizationClassify documents into a number of pre defined categories. Documents c
Temple - CIS - 525
Independent Component Analysis features of Color & Stereo imagesAuthors: Patrik O. Hoyer Aapo HyvarinenCIS 526: Neural ComputationPresented by: Ajay Kumar YadavOverview Introduction Background Study Data Preprocessing Color Image Exper
Temple - CHAPTERS - 1400
IntroductionThe pieces gathered here include both works of scholarship and instances of political advocacy. Many meld the two. The last is largely autobiographical. At the same time, the entire collection represents something more than the understa
Temple - CHAPTERS - 1400
Introduction: The Foxs Wisdomhis is a study of how the animals who share our lives influence who we are. It is based on several sources of data collected during three years of research. Most of this research took place in my work as a volunteer at
Temple - CHAPTERS - 1100
Temple - TUA - 85356
Jasmine Moseley CIS 1055 Section 609Stands for acquired immune deficiency syndrome. Caused by the Human Imune deficiency virus. AIDS is a virus that weakens the imune system. By having AIDS education starting in the elementary school level we
Temple - TUA - 84776
Safe Drinking WaterBettering the Accessibility of in AfricaIsaiah Little CIS 1055-015African Economic Outlook Beyond scarcity: Power, politics and the global water crisisMobilising a network of in-country Nearly 100 million children were kept o
Temple - CIS - 617
Introduction to Networks 1. Computers are typically connected by communication channels that provide "speed of light" communication between computers attached to the channel. Communication channels differ in: a. The number of computers attached to th
Temple - CIS - 617
Chapter 7 Notes 1. Domain Name Service (DNS) Protocol A. The Domain Name System (DNS) implements a worldwide distributed database in which clients use UDP port 53 to query name servers that implement the database. See: http:/www.rfc-editor.org/rfc/rf
Temple - CIS - 617
Linux 7.2 Honey Pot http:/unix.temple.edu/~stafford/l3com/ Background I built a Red Hat Linux 7.2 system in my office but I did not install any of the patches. The details of the system were: Domain name - eta.cis.temple.edu IP address - 155.247.182.
Temple - CIS - 617
-Installing Fedora Linux1. Insert the Fedora Linux Core 2 Disk 1 in the CD as the computer boots.2. There are two ways to install Fedora in our labs. a. Use 4 CD's b. Use 1 CD and get the other stuff over the network.2.a Because you
Temple - CIS - 617
To use this programs, first change SERVER_PORT to some randomnumber between 1024 and 65535. Try to avoid picking the samenumber as other students. Change it in both files.Compile the programs like this:cc -o client client.c -lsocket -lnslcc
Temple - CIS - 617
Chapter 8 notes 0. Not included - authentication using biometrics, password security, buffer overflow attacks, Trojan horses, login spoofing, logic bombs, viruses, and worms. 1. Secrecy, authentication, verification and non-repudiation. a. Secrecy -
Temple - CIS - 617
Assignment Background The floppy disk contains a demonstration version of the Lanwatch (R) network analyzer program. This version of the program was obtained from FTP Software, which has since transferred rights for the commercial version to Precisio
Temple - CIS - 617
Some Famous Unix Commands 1. Famous Unix directories and files include the following: / /etc - called "slash", the top level directory - directory containing system configuration files and management command, rhymes with Betsy - famous network files
Temple - CIS - 320
CIS 320 Practice Quiz 5, Unix files ssn (last 4 digits) _ 1. 3. 5. 7. 9. 11. 13. 15. 17. 19. 21. 23. 25. 27. 29. 31. _ _ _ 2. 4. 6. 8. 10. 12. 14. 16. 18. 20. 22. 24. 26. 28. 30. 32.Last Name (print)_First Name (print) __ Signature _/bin /bin
Temple - CIS - 617
Some Not-So Famous Windows Commands 1. Not-so-famous Windows directories and files include the following: C:\ C:\WINNT\system32\drivers\etc hosts, services, protocol C:\WINNT\system32 C:\Documents and Settings - the "root" of the C: disk - directory
Temple - CIS - 617
Assignment Background The floppy disk contains a demonstration version of the Lanwatch (R) network analyzer program. This version of the program was obtained from FTP Software, which has since transferred rights for the commercial version to Precisio
Temple - CIS - 617
CIS 617 - Practice Final Last Name (print) _ Chapters 1 to 8 First Name (print) _-AcronymsADSL __AES _AM _ANSI __ARP _ARPA _ARQ __AS _ASK _ASP _ATM __BGP _CAT5 _CDMA
Temple - CIS - 617
128.127.2.30 128.127.2.100 128.127.25.100 128.127.2.101 128.127.2.125 128.127.2.126 128.127.2.127 128.127.2.128 128.127.2.129 128.127.2.130 128.127.2.131 128.127.2.132 128.127.2.133 128.127.2.134 128.127.2.135 128.127.3.136 128.127.2.138 128.127.2.13
Temple - CIS - 617
csc /r:system.dll /r:RemotingServer.exe /out:RemotingClient.exe RemotingClient.cs
Temple - CIS - 350
/ DemoProperty.cs (C# code)/ csc DemoProperty.csusing System;public class DemoProperty{ int age = 10; public int Age { get { return age; } set { age = value; } }public static void Main() { DemoProperty dp = new DemoPro
Temple - CIS - 350
Microsoftese - the language of Bill glossaries HWiesel@temple.edu automation glossary at MSDN Home > MSDN Library > SDK DocumentationVisual Studio 6 glossary (in Visual C and C+ 6.0 Product Documentation Enterprise glossary in Using Visual Studio,
Temple - CIS - 350
CIS 350, Quiz 4 on Hummel 4 last name _ first name _ 1. T or F GUI programming is event driven programming. 2. T or F In the word of .NET, you have two types of GUI a
Temple - CIS - 350
XSL Transforms1. Which of the following are built-in templates. 1. <xsl:template match="*"/> 2. <xsl:template match="/"/> 3. <xsl:template match="text()"/> 4. <xsl:template match="@*"/> 5. <xsl:template match="processing-instruction"/
Temple - CIS - 350
CIS 350 Final Examination last name _ first name _You may bring notes to the examination provided that the notes are written on one side of one 8 1/2 by 11 sheet of paper. It must be
Temple - CIS - 350
CIS 350 Quiz 16 on Hummel 13 last name _ first name _ 1. T F With synchronous distributed designs, the client makes a call and blocks waiting for a response. 2. T F Wit
Temple - CIS - 350
CIS 350, Quiz 2 on Hummel 2 last name _ first name _ 1. T or F Everything in .NET (arrays, strings, integers, etc) behaves like an object. 2. T or F In V
Temple - CIS - 350
CIS 350, Quiz 11 on Hummel 10 last name _ first name _ 1. T F In VB .NET, use the "notOverrideable" keyword in the parent to prevent a child subclass from overriding the p
Temple - CIS - 350
CIS 350, Quiz 1 on Hummel 1 last name _ first name _ 1. Fill in the boxes (CLR, FXCL, Windows OS) +-+--+ | .NET application | | +-+-
Temple - CIS - 350
XML Schema 1. <all> 2. <any> 3. <attribute> 4. <choice> 5. <complexContent> 6. <complexType> 7. <element> 8. <extension> 9. <group> 10. <include> 11. <list> 12. <