Using Technology to Manage Information Chapter 14.
-
Upload
lester-bridges -
Category
Documents
-
view
225 -
download
1
Transcript of Using Technology to Manage Information Chapter 14.
LO 14.1 Distinguish between data and information, and explain the role of management information systems in business.
LO 14.2 List the components and different types of information systems.
LO 14.3 Outline how computer hardware and software are used to manage information.
LO 14.4 Describe the networking and telecommunications technology and types of computer networks.
Learning Objectives
LO 14.5 Discuss the security and ethical issues involving computer information systems.
LO 14.6 Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters.
LO 14.7 Review the current trends in information systems.
Data: Raw facts and figures that may or may not be meaningful to a business decision
Information: Knowledge gained from processing data
Information system: An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence
Chief information officer (CIO): The executive responsible for managing a firm’s information systems and related computer technologies
Traditionally reports directly to the chief executive officer (CEO).
Data, Information, and Information Systems
How is data different from information?
a. Data is current; information is unchanging. b. Information is knowledge; data are the facts that can be converted to a usable form. c. Data is continuously collected but information is only collected sporadically. d. Information is more overwhelming than data.
Test Your Knowledge
How is data different from information?
a. Data is current; information is unchanging. b. Information is knowledge; data are the facts that can be converted to a usable form. c. Data is continuously collected but information is only collected sporadically. d. Information is more overwhelming than data. Answer: B
Test Your Knowledge
Computer-based information systems: Information systems that use computer and related technologies to store information electronically in an organized, accessible manner Computer hardware Computer software Telecommunications and computer
networks Data resource management
Components and Types of Information Systems
Operational support systems Transaction processing system Process control system
Management Support Systems Management information system (MIS) Decision support system (DSS) Executive support system (ESS) Expert system
Types of Information Systems
A(n) _________ is a management support system that imitates human thinking through “if-then” rules.
a. decision support systemb. management information system c. executive support systemd. expert system
Test Your Knowledge
A(n) _________ is a management support system that imitates human thinking through “if-then” rules.
a. decision support systemb. management information system c. executive support systemd. expert system Answer: D
Test Your Knowledge
Hardware: All tangible, or physical, elements of a computer system
Input devices are the components that store and process data, perform calculations The keyboard and mouse allow users to enter data
and commands; storage and processing components consist of the hard drive and other storage components like flash drives.
Output devices present results to users Monitors, printers transmit or display documents
Computer Hardware
Types of computersMainframes
Supercomputers
Midrange systems High-end network servers
Personal computers Desktop, notebook (laptop) computers
TabletsHand-held devices
PDAs, smartphones
Computer Hardware
Software: All the programs, routines, and computer languages that control a computer and tell it how to operate
Operating system Windows operating system Mac operating system
Application Software Adobe Acrobat Microsoft PowerPoint Quicken
Computer Software
The Internet Local area networks (LAN) Wide area networks (WAN) Wireless local networks (WiFi) Intranets Virtual private networks
(VPN) Voice over Internet Protocol
(VoIP)
Computer Networks
A(n) _________ is a secure connections between two points on the Internet, using firewalls and programs that encrypt, or encode, data to make them more secure during transit.
a. virtual private network (VPN)b. local area network (LAN) c. voice over Internet Protocol (VoIP)d. intranet
Test Your Knowledge
A(n) _________ is a secure connections between two points on the Internet, using firewalls and programs that encrypt, or encode, data to make them more secure during transit.
a. virtual private network (VPN)b. local area network (LAN) c. voice over Internet Protocol (VoIP)d. intranet Answer: A
Test Your Knowledge
E-crime Malware
Computer viruses Worms Botnet Trojan horses Spyware
Security Issues affecting Information Systems
Use of information systems by employees and vendors Personal use Privacy
Organizational use of information: Employment records Employee monitoring Customer data
Ethical Issues affecting Information Systems
Natural disasters Power failures Equipment malfunctions Software glitches Human error Terrorist attacks
The most basic precaution is routine backup of software and data, at the organizational and individual level.
Disaster Recovery and Backup
The distributed workforce Employees who work in virtual offices
Application service providers (ASP) An outside supplier that provides both the computers
and the application support for managing an information system
On-demand computing The use of software time from application providers;
firms pay only for their usage of the software, not for purchasing or maintaining the software
Cloud computing The use of powerful servers that store applications
software and databases that users access by using any Internet-connected device, such as a PC or a smartphone
Grid computing A network of smaller computers that run special software
Information Systems Trends