Review - PowerPoint PPT Presentation

About This Presentation
Title:

Review

Description:

Design a relational database. Create primary key for every entity and the necessary foreign key ... Network Concepts. Protocol, wire, modem. TCP/IP-OSI Architecture ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 19
Provided by: CSUS5
Learn more at: https://www.csus.edu
Category:
Tags: review

less

Transcript and Presenter's Notes

Title: Review


1
Review
  • Exam 1
  • Chapters 1 - 5

2
Chapter 1 MIS and You
  • MIS, IS, and IT
  • IS Components
  • Hardware
  • Software
  • Data
  • Procedures
  • People
  • Information and Data
  • Information Characteristics
  • Accurate cross check
  • Timely real time
  • Relevant
  • Just barely sufficient
  • Worth its cost
  • Moores Law
  • Discussion and Case Study

3
Chapter 1 - Discussion
  • Security password and password etiquette (5a-b)
  • Ethics misdirected information use (11a-b)

4
Chapter 1 - Case Study
  • Case 1-1 Computerizing the Ministry of foreign
    Affairs (20-21)
  • Case 1-2 IRS Requirements Creep (21-22)

5
Chapter 2 Purpose of Information Systems
  • Information Systems Purposes
  • Competitive Advantage
  • Problem Definition
  • Decision Making
  • Competitive Advantage
  • Products
  • creation of barriers
  • Establishing alliances
  • Reducing costs
  • Problem Definition
  • Customer relationship management (CRM) system
  • Knowledge management system (KMS)
  • Manufacturing Quality-Control Information System
  • Decision Making Dimension
  • Transaction processing systems (TPS)
  • Management information systems (MIS)
  • Executive information systems (EIS)
  • Discussion and Case Study

6
Chapter 2 - Discussion
  • Security (27a-b)
  • Name the competitive advantages for a financial
    institution by implementing security system
  • The cost of no security for a financial institute
  • Ethics (29a-b)
  • Social impact of the digital divide
  • Responsibility for business and government
  • Opposing forces (31a-b)
  • Can a business survive without any IS?
  • Egocentric vs. empathetic thinking (33a-b)
  • How to apply this concept in developing and using
    IS?

7
Chapter 2 - Case Study
  • Case study 2-1Microsoft Customer Support (41-42)

8
Chapter 3 Hardware Software
  • Computer
  • Hardware
  • Input, processing, output, storage, and
    communication
  • Computer Data and Instruction
  • Microsoft Windows Intel instruction set by Intel
    Corporation
  • Macintosh computers PowerPC instruction set
    using Powerful PC processor
  • CPU (Central Processing Unit) and memory
  • Computer Performance
  • The speed of main memory
  • The speed and width of the data bus
  • Software
  • Operating system (OS)
  • Application software
  • Computer Virus
  • Type
  • Prevention

9
Chapter 3 - Discussion
  • Security (53a-b)
  • How to enforce employees to follow the antivirus
    policy and procedure in any organization
  • State your opinions related to the statement the
    viruses are developed by the antivirus software
    vendor
  • Opposing forces (57a-b)
  • State your opinions related to the statement the
    new computer products are the conspiracy between
    hardware and software vendors to ripe off
    consumers
  • Ethics (61a-b)
  • State your opinions about the major impacts in
    terms of social, entertainment, government, and
    business operations by implementing the TCG/NGSCB
    (Trusted Computing Group/Next Generation Secure
    Computing Base)

10
Chapter 3 - Case Study
  • Case 3-1 (69-70) Wall Data IS Support every one
    except 6 9
  • Case 3-2 (70-71) Dell Leverages the Internet
    questions 1 2

11
Chapter 4 Database Processing
  • Purpose of Database
  • Components of Database System
  • User, application, DBMS, and database
  • Multi-user Processing
  • Relational Database Design
  • Entity-relationship Model
  • Primary key, foreign key
  • Relationship (dependent and independent)
  • Cardinality
  • Normalization
  • Database Administration
  • DBA and steering committee
  • Database Security
  • Firewall, OS and DBMS patches, physical security,
    logical security, logs and security emergency
    plan
  • Discussion, Design, and Case Study

12
Chapter 4 - Discussion
  • Ethics (81a-b)
  • What should the company do to avoid the situation
    at first place?
  • What should the company do to properly handle
    Kellys case
  • What should Kelly do to avoid the stated
    consequence after querying the database?
  • What could Kelly do to save his career?
  • Opposing forces (97a-b)
  • What should the DBA of car dealer do to convince
    every salesperson to build and use a solid sales
    information database?
  • Reflections (101a-b)
  • What should the DBA of any organization to handle
    the changing requirements for a new database?
  • What should the DBA of any organization to handle
    the new requirements for a existing database?

13
Chapter 4 - Relational Database Design
  • Given the following entities and their attributes
  • Buyer (BuyerID, BuyerName)
  • Owner (OwnerID, OwnerName)
  • Property (PropertyID, PropertyAddres, OwnerID)
  • Agent (AgentID, AgentName)
  • Sales (SalesID, BuyerID, OwnerID, PropertyID,
    AgentID, Price, Date)
  • Design a relational database
  • Create primary key for every entity and the
    necessary foreign key
  • Create an entity-relationship diagram

14
Chapter 4 - Case Study
  • Assignment 22 (105)
  • Case 4-1 (107-110) questions 1, 4, and 7 (add
    aircraft for 7)
  • Case 4-2 (110-113) questions 1 and 2

15
Chapter 5 - Telecommunication Internet
Technology
  • Network Concepts
  • Protocol, wire, modem
  • TCP/IP-OSI Architecture
  • Application, transport, Internet, data link,
    physical
  • Network Types
  • LAN
  • WAN
  • Public Switched Data Network (frame relay,
    asynchronous transfer mode, and Ethernet)
  • Virtual Private Network
  • Network Comparison
  • Internet
  • Domain Name System
  • IP Addressing Schemes
  • Security

16
Chapter 5 - Discussion
  • Problem solving (121a-b)
  • What are the new opportunities for the business
    generated by the Internet?
  • What are the new threats for the business
    generated by the Internet?
  • Opposing forces (129a-b)
  • State your opinions related to the negative
    impact on the society when everyone is connect
    through the Internet.
  • Security (133a-b)
  • State the impacts on the society and business
    from the government having an decryption method
    to decode everything over the Internet.
  • Ethics (141a-b)
  • State the impacts from the employees private
    usage of companys computer facility.
  • Reflections (143a-b)
  • How should you react properly from not getting
    lost from this Internet age?

17
Chapter 5 - Case Study
  • Case 5-1 (148-149) Network Services questions 1,
    3, 4, 5, 6, 9, and 10

18
Assignments
  • Electronic Billing Payment System
  • Computer System for College Freshman
Write a Comment
User Comments (0)
About PowerShow.com