November 29, 2011
Chapter 12 Homework Using Your Knowledge
a. It is very important to review your credit records to catch errors and inaccuracies, since these
can take a long time to reconcile. You should check the summary of acc
November 10, 2011
Chapter 10 Using Your Knowledge
A business analyst works with the management if a company in order to help them do a
better job of organizing the company and making it as profitable as it can be. They use a variety
November 1, 2011
SELECT ProductName, to_char(UnitPrice, '$9,999.99') AS "Price"
ORDER BY to_char(UnitPrice, '$9,999.99')DESC
Cte de Blaye
SELECT ProductName, (UnitPrice - UnitCost
October 20, 2011
WHERE Country = 'USA'
White Clover Markets
Old World Delicatessen
Rattlesnake Canyon Grocery
Split Rail Beer and Ale
October 10th, 2011
Preparation Assignment 10/11
1. An example of a personal information system related to the university is the chat system
on the muConnect email. It has a single user and informal procedures, and is easy to manage
October 5th, 2011
Using Your Knowledge #3
a. FlexTime equipment that is likely to have a wired connection to a LAN includes the
computers on site at FlexTime. The LAN in a business is comprised of computers an
September 20, 2011
Questions for Guest Speakers
1. What do graduates with MIS degrees typically do?
2. How is MIS pertinent to other areas of business such as Finance or Accounting?
3. Is a minor in MIS more useful with certain busi
September 12, 2011
Discussion Questions Page 275
1. The overseas outsourcing problem is overstated in several ways. First, approximately
250,000 jobs will be moved overseas from now until 2015. In the context of 137 million
1. I agree that this course is the most important in the business school. Accounting and
management are also both very important for businesses, but information systems are
pertinent in all areas of business. Since the cost
What Is an Information System?
o A group of components that interact to produce information
What Is MIS?
o The development and use of information systems that help businesses
achieve their goals and objectives
Development and Use of Information
How Did This Stuff Get Here?
o Through the interaction of business processes
What Is a Business Process?
o A network of activities, resources, facilities, and information that interact to
achieve some business function. A business process is a s
How Does Organizational Strategy Determine Information Systems Structure?
o Competitive strategy determines the structure, features, and functions of
ever information system
What Five Forces Determine Industry Structure?
o Bargaining power of cu
What Is the Purpose of a Database?
o To keep track of things
What Does a Database Contain?
o Database a self-describing collection of integrated records
o Byte character of data
o Column what bytes are grouped into
o Fields another name for colu
What Is a Computer Network?
o A collection of computers that communicate with one another over
What Are the Components of a LAN?
o Switch a special-purpose computer that receives and transmits
messages on the LAN
o Network int
Why Is Business Process Management Important to Organizations?
o BPM the systematic process of creating, assessing, and altering
o Processing an order crosses departmental boundaries
o Credit card processing, shipping, schedu
How Do Companies Use E-Commerce?
o E-Commerce buying and selling goods and services over public and
E-Commerce Merchant Companies
o Take title to the goods that they sell (B2C, B2B)
o Arrange purchase an
How Big Is an Exabyte, and Why Does It Matter?
o An Exabyte = 1,000 petabytes, which equal 1,000 terabytes
o Businesses collect massive amounts of data
Storage capacity is increasing as cost is decreasing
Storage capacity is becoming almost un
What Is Systems Development?
o Also known as systems analysis and design
o Process of creating and maintaining information systems
o Information systems involve all 5 IS components
Hardware, software, data, procedures, people
o Developing comp
Why Do You Need to Know About the IT Department?
o Need to understand responsibilities and duties of IT department
o Need to know about functions of IT department to be IS-savvy manager
o Manager of small company needs to ensure functions of IT
What Are the Sources and Types of Security Threats?
o Unintentional human errors and mistakes
o Malicious human activity
o Natural events and disasters
Unauthorized Data Disclosure
o Human error
Posting private information in public places
MIS 235 Spring 2012 Common Portion of Final Exam Review Guide
Student Learning Objectives
Demonstrate IT Conceptual Knowledge and be able to
Explain why information technology is valuable for all business students to know.
Describe pervasive e-business te
1. Technical Safeguards
a. Identification and Authentication
a.i. Password and username
a.ii. Smart cards use a card and a PIN to be authenticated
a.iii. Biometric Authentication uses personal physical
characteristics such as fingerprints, facial features
Systems Conversion & Maintenance
a. System Conversion once the system has passed integrated
testing, the organization installs the new system. Process of
converting business activity from the old system to the new
Pilot installation the organiz
a. Define system goals and scope
b. Assess feasibility
b.i. aim is to eliminate obviously nonsensible projects before
forming a project development team and investing significant
what is a budget, de
a. Faulty Service problems include incorrect system operations,
incorrect data modification, systems that incorrectly ship goods,
billing info, and info to employees.
a.i. Human Error: Procedural mistakes, development and
installation errors. Syst
1. Data Mart
a. Data Mart
a data collection that is created to address the needs of a
particular business function, problem, or opportunity.
2. How it Differs from a Data Warehouse
a. Data warehouse
takes data from the data manufacturers, cleans
1. Sources and Types of Security Threats
a. Security threats: a problem with the security of an information
system or the data therein caused by human error, malicious
activity, or natural disaster.
a.i. Human errors and mistakes accidental pro
1. Systems Development the process of creating and maintaining
a. Information Systems are never off the shelf
b. Uses all 5 components
2. Why Systems Development is Difficult and Risky
a. The difficulty of requirements dete
1. Exabyte size, why it matters
a. Exabyte equals 1,000 petabytes which equals 1,000 terabytes.
One Exabyte equals five times the amount of all printed material. It
is an exponential growth in data.
2. Business Intelligence (BI) Systems Provide
1. Requirements Analysis Phase
a. The primary purpose is to determine and document the specific
features and functions of the new system.
a.i. Determine Requirements
Conduct user interviews
Evaluate existing systems