Chapter 15 to final

Chapter 15 to final -...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 15–Managing Technology and Information 00:22 Information Systems Data – raw facts and figures Information – knowledge gained from processing data Information system – organized method for collecting, storing, and communicating  information on operations Chief Information Officer Components of Information Systems Computer Hardware Computer Software Telecommunications and Computer Networks Types of Information Systems Operational Support Systems Transaction Processing System – Record and process data from business transactions Process Control System – monitor and control physical processes. EX: Alert on nuclear  energy Management Support Systems Management Information System (MIS) – Designed to produce reports Decision Support System (DSS) – Support to managers Executive support system (ESS) – Overall detail of info Computer Hardware The tangible elements of a computer The components that store and process data, perform calculations
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Input devices like keyboard and mouse Storage and processing components consist of the hard drive and other storage  components like flash drives. Types of Computers Desktop Server – heart of computer network Mainframes – Simple computation with bulk data processing       Ex: census Supercomputers – Optimized for complicated computation. Notebook Computers Handheld devices Computer Software Programs, routines and computer languages that control a computer Operating System  Windows Mac Application Software Microsoft PowerPoint Quicken Communication via Wireless Silence your phone Excuse yourself to take a call Don’t use LOL/SMH
Background image of page 2
Check spelling Follow up Computer networks THE INTERNET – largest network Local Area Networks (LAN) – In building Wide Area Networks (WAN) – Over phone lines Wireless local Networks – current standard WiFi Intranets Virtual Private Networks (VPN) Voice over Internet Protocol (VoIP) Security Issues E-Crime Computer Viruses Worms – Software exploits security hole Trojan Horses – Ex: Free icons Spyware – Gathers user info Ethical Issues Affecting Information Systems Use of info systems by employees and vendors Personal use Privacy Organizational use of info
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Employment records – Bank record, SSN, Etc Employee monitoring – computer use Natural Disasters Power Failures Equipment malfunctions Software glitches Human error Terrorist Attacks The most basic precaution – backup Information systems Trends The Distributed Workforce Employees who work in virtual offices Application Service Providers A firm that provides computers  and application support On Demand, Cloud, and Grid Computing
Background image of page 4
Chapter 16 - Accounting 00:22 Accounting Accounting is the process of measuring, interpreting, and communicating financial 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/22/2012 for the course INTRO TO B 100 taught by Professor Reaves during the Fall '10 term at Rutgers.

Page1 / 15

Chapter 15 to final -...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online