Вы находитесь на странице: 1из 2

CH.8 Intelligent Systems :AI : Simulate Human Intelligence, Gain Senses. Intelligent System: Emulates/Enhances Human Capability.

Expert System: Intelligent system -> Reasoning Methods to solve problems. Fuzzy Logic: Using approximate/subjective values to solve or mimic human expertise in an incomplete problem. Neural Network : Attempts to approximate human brain. Intelligent Agent (BOT): 1.User Agent: Auto Perform Task 2. Buyer Agents: Finds Best price 3. Maintaining/ Sensing Agent: Inventory level Monitoring 4. Data mining: analyze large date to detect 5. Web Crawlers/Web Spiders: Browse web for specific information 6.Destructive Agent: Spyware mass email program. CH 9. Externally Focused Applications: Interconnecting separate cooperating businesses value systems to streamline. Upstream info: Received Info Downstream info: Created/ Distributed info. Applications: Packaged, made for many consumers and businesses. Custom: Special made for few or one customer. Stand-Alone Applications: Now called Legacy Systems, Outdated. Legacy Systems: Non connected single systems, operating independently. Vanilla Version: Standard out-of-the-box software. Customization: If vanilla doesnt work, integration or altered vanilla. Best Practices-Based: Might change Business Process that gives them an edge, could be bad, intended to standard business practice. Business Process Management: used to evaluate/rethink business process. Customer Relationship Management (defined by following) Architecture of a CRM: Operational, Analytical CRM: Operational CRM: Marketing, Sales, Support collaboration for interaction with the customer. Analytical CRM: Analyze customer behavior/ perception of quality, price, and overall satisfaction. Collaborative CRM: Communication with customers from entire organization. Formula for Enterprise System Success: Secure executive Sponsorship: Informed/ Involved Executives. Get Help From Outside Experts: Consultants tend to help move companies through transitions more quickly. Thoroughly Train Users: When new enterprise systems are implemented, train well, so not to lose productivity. Take a multidisciplinary approach to Implementations: When deciding on an Enterprise Solution involve all levels of the business to avoid dissention or animosity toward the new system. Look beyond ERP (Enterprise Resource Planning): SOA (Service-Oriented Planning) is another option that might be less demanding than an entirely new Enterprise System Integration. CH 10: System Development Life Cycle (SDLC): 1. System Planning and Selection: Focus on overhauling/replacing/updating systems that are vital to the livelihood and continuation of the business. 2. System Analysis: Designers gain a thorough understanding of how the business currently operates, collection requirements for the new system design. 4. System Implementation and Operation: Making a working system, programming, testing, debugging, conversion (of old system documentation, user training, support. Development testing alpha/beta. Request for Proposal (RFP): Tell vendors what requirements are and invite them to provide how they will meet the requirements sent to vendors who might provide hardware/ software applications. End User Development: Users will help development the applications they use. Problems Avoided: Cost of labor, Long development time, Slow modifications/updates, Work Overload. CH 11. Information Privacy: Concerned with what info an individual should have to reveal to others in the workplace or through order transactions. Identity Theft: Stealing of another persons social security number credit card number, or other personal information, so to use their money. Information Accuracy: Ensuring authenticity and fidelity of info, identify those responsible for info errors that harm people. Information Property: Who owns info about people what can be sold/exchange. Cyber Squatting: Buy a domain and wait till someone wants it and sells it for much more then it was purchased for. The need for a code of ethical conduct: No current internet code of conduct. Federal/ State Laws: Computer fraud and abuse act of 1986, Electronic communication privacy act of 1986, Prohibits: Stealing or compromising data about national defense, foreign relations, unauthorized access to computers owned by a government agency, violating bank data, intercepting/intruding international communications, threat to damage computer systems to extract money. Computer forensics: Evaluate digital info for judicial review Honeypot: A trap for hackers/ Crackers Hacker: Technically a curious person learning about computers by roaming around in them. Cracker: Intentional Damages/Steals/Criminal Hackers Hacktivists: Crackers with political/ethical motivation Warez: Stolen Software. Intellectual Property: creations of the mind Malware: malicious software: viruses, warms, Trojans Logic Bomb/Time bomb: Variation of Trojan that waits for a specific even or time to elapse. Internet Hoax: False message circulated online Cyber Harassment: Communicated obscene, vulgar, threatening things, causes victim to endure Distress Cyber Stalking: Continued Cyber Harassment. Cyber Bullying: Deilberatly cause emotional distress. Online Predators: Target young/ old for sexual/financial purpose. Cyber War: Countries distrup each others vital computer systems Web Vandalism: Deface Websites Patriot Hackers: Independent Citizens fighting other countries by hacking Cyber Terrorism: Intermediate or coerce, scare or give terror to citizens
Acronyms: ADSI: Asymmetric Digital Subscriber Line Al: Artificial Intelligence ALU: Arithmetic Logic Unit ARPANET: Advanced Research Projects Agency Network ASCII: American Standard Code for Information Interchange ASP: Application Service Provider ATM: Asynchronous Transfer Mode ATM: Automated Teller Machine B2B: Business-to-Business B2C: Business-to-Consumer B2E: Business-to-Employee BIOS: Basic Input-Output System BPI: Bytes per Inch BPM: Business Process Management BPR: Business Process Reengineering C2C: Consumer-to-Consumer CAAT: Computer-Assisted Auditing Tools CAD: Computer-Aided Design CAE: Computer-Aided Engineering CAN: Campus Area Network CASE: Computer-Aided Software Engineering CD-R: Compact Disk-Recordable CD-RW: Compact Disk-Rewritable CIC: Customer Interaction Center ClO: Chief Information Officer COBIT: Control Objectives for Information and Related Technology COPA: Child Online Protection Act CPI: Characters per Inch CPU: Central Processing Unit CRM: Customer Relationship Management CRT: Cathode Ray Tube CSF: Critical Success Factor CSMA/CD: Carrier Sense Multiple Access/Collision Detect CSS: Customer Service and Support CSU: Channel Service Unit CVV2: Customer Verification Value DARPA: Defense Advanced Research Projects Agency DBA: Database Administrator DBMS: Database Management System DNS: Domain Name System DoS: Denial of Service DRM: Digital Rights Management DSL: Digital Subscriber Line DSS: Decision Support System DVD: Digital Versatile Disk DVD: Digital Video Disk EC: Electronic Commerce EDI: Electronic Data Interchange EEPROM: Electrically Erasable Programmable Read-Only Memory EIS: Executive Information System EMI: Electromagnetic Interference EMM: Enterprise Marketing Management EMS: Electronic Meeting System ERD: Entity-Relationship Diagram ERP: Enterprise Resource Planning ES: Expert System ETL: Extraction, Transformation, and Loading 5GL: Fifth-Generation Language FLOPS: Floating Point Operations per Second 4GL: Fourth-Generation Language FTTH: Fiber to the Home FTTP: Fiber to the Premises G2B: Government-to-BuSine55 G2C: Government-to-Citizens G2G: Government-tO-Government GEO: Geosynchronous Earth Orbit GIS : Geographic Information System GPS: Global Positioning System GUI: Graphical User Interface HG: Human-Computer Interface HTML: Hypertext Markup Language HTTP: Hypertext Transfer Protocol ICANN: Internet Corporation for Assigned Names and Numbers loS: Internet over Satellite lOS: Inter-organizational System IP: Internet Protocol IS: Information System ISDN: Integrated Services Digital Network ISP: Internet Service Provider IT: Information Technology IVR: Interactive Voice Response IXC: Interexchange Carrier JAD: Joint Application Design KPI: Key Performance Indicator LAN: Local Area Network LCD: Liquid Crystal Display LEO: Low Earth Orbit MAN: Metropolitan Area Network MEO: Middle Earth Orbit MICR: Magnetic Ink Character Recognition MIS: Management Information System MUX: Multiplexer NAP: Network Access Point NAT: Network Address Translation NIC: Network Interface Card NOS: Network Operating System NSF: National Science Foundation NSFNET: National Science Foundation Network OAS: Office Automation System OCR: Optical Character Recognition OLAP: Online Analytical Processing OLED: Organic Light-Emitting Diode OLTP: Online Transaction Processing OMR: Optical Mark Recognition OOA&D: Object-Oriented Analysis and Design 0SI: Open Systems Interconnection PAN: Personal Area Network PBX: Private Branch Exchange PC: Personal Computer PDA: Personal Digital Assistant PIN: Personal Identification Number PLC: Power Line Communication POTS: Plain Old Telephone Service PSTN: Public Switched Telephone Network QBE: Query by Example RAD: Rapid Application Development RAID: Redundant Array of Independent Disks RAM: Random Access Memory RFID: Radio Frequency Identification RFP: Request for Proposals ROM: Read-Only Memory RSS: Real Simple Syndication SaaS: Software as a Service SAM: Software Asset Management SCE: Supply Chain Execution SCM: Supply Chain Management SCP: Supply Chain Planning SDLC: Systems Development Life Cycle SDSL: Symmetric Digital Subscriber Line SEO: Search Engine Optimization SFA: Sales Force Automation SOA: Service-Oriented Architecture SQL: Structured Query Language SSP: Storage Service Provider TCO: Total Cost of Ownership TCP/IP: Transmission Control Protocol/Internet Prot TPS: Transaction Processing System ULP: Ultra Low Power UMPC: Ultra Mobile PC URL: Uniform Resource Locator VAN: Value Added Network V0IP: Voice Over IP VPN: Virtual Private Network WiFi: Wireless Fidelity WiMax: Worldwide Interoperability for Microwave Access WLAN: Wireless Local Area Network WWW: World Wide Web XBRL: Extensible Business Reporting Language XML: Extensible Markup Language|*|CPS1|*|

The Access starter file database consists of ____ tables. A two B three C four D five E six F seven|| The Access assignment require the creation of _____ queries A eight B nine C ten D eleven E twelve F thirteen ||The Access assignment requires the creation of ____ data entry forms. A no B one C two D three|| The Access assignment requires the creation and printing of _____ report(s) A no B one C two D three|| Which of the following constructs would be used to cause the field 'Name' to be displayed in query results as 'Customer'? A Name = Customer B [Name] : Customer C Customer : Name D Customer = Name ||Which of the following constructs would be used to concatenate the fields 'First' and 'Last' separated by a space in query results labeled 'Name'? A Name: First + " " + Last B Name: [First] + " " + [Last] C Name: [First] & " " & [Last] D Name: First & " " & Last ||What criterion would be used in the query design grid for field 'Last Name' to only display only those individuals with last names starting with P? A Like "P" B Like "P?" C Like "P*" |*| CPS 2|*|You wish to create a calculated field labeled 'Profit' what shows the difference between numeric fields 'Revenues' and 'Expenses'. Which would do that? A [Revenues] - [Expenses] : [Profit] B [Profit] : [Revenues] - [Expenses] C "Profit" : [Revenues] - [Expenses] D Profit : [Revenues] - [Expenses] || What criterion would you enter for the currency field 'Fringe Benefits' to filter only those records whose value is $10,000 or less? A <= $10,000.00 B < 10,000 C <= 10000 D < 10000 || If multiple fields in a query are used to sort fields, the sort order is executed ___________ A by use of a SortField criterion B by use of a SortKey criterion C by use of a SortSequence criterion D by use of a SortOrder criterion E none of the above correctly complete the sentence|| In a query, to divide records based on the values in a specified field, you would use the _____ operator A GroupOn B GroupSubset C GroupRange D GroupBy E GroupSelection ||5 Which of the following functions is NOT available as an aggregate function in Access? A highest value B lowest value C mean value (average) D most often occurring value (mode) E sum of values || When executing a query, all fields _____ be displayed in the query results. A used in the design grid must B used in the design grid on which sort criterion are specified must C used in the design grid on which selection criterion are specified must D used in the design grid need not Access reports can display data directly from ____ A one table B two or more related tables C a query involving one table D a query involving two or more related tables E all four of the above correctly complete the sentence|*| CPS 3|*|Which of the following will be accepted as valid during data entry using Access? A adding a record with a duplicate primary key value B entering numbers into a field of datatype 'Text' C entering text into a field of datatype 'Number' D omitting an entry in a

required field ||Which Access table fields are commonly defined with an input mask? A First name, middle name, last name B social security number, zip code C city, state, zip code D salary ||Which Access table field properties would you use to limit data entry to 5 characters and ensure that an entry is made? A field size and input mask B field size and format C input mask and required D field size and required || Which of the following will always print on each and every page of a mulit-page, grouped Access report? A report header B group header C detail line D report footer ||While in Access table datasheet view, a temporary sub-set of selected records can be created by defining a __. A form B query C filter D screen ||During Access table design, fields upon which their values may have mathematical calculations performed cannot be of datatype ___ A number B date/time C currency |*|CPS4|*|A __ report highlights situations that are out of the normal range. Table 8.4 A scheduled B key indicator C exception D drill-down||Which of the following is NOT a benefit of groupware? Table 8.10 A group memory B openness C access to external information D parallelism|| Which of the following is NOT type of intelligent agent system? List page 340 A monitoring and sensing agent B shipping bots C user agents D destructive agents ||Which of the following is NOT a way information can be entered or processed in a TPS? pages 319-320 A fully automated data entry B manual data entry C off-line processing D batch processing || __decisions are typically made when some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made. Pages 314-317 A structured B semi-structured C delegated D automated ||Which of the following is a commonly used GIS application? pages 347-349 A customer dot mapping B sales area mapping C market area mapping D supplier mapping ||Which of the following is NOT a benefit of Knowledge Management Systems? Table 8.12 A improved organizational performance B enhanced employee retention C enhanced innovation and creativity D getting employee buy-in|| Which of the following is NOT a type of AI? pages 337-340 A intelligent agent system B decision support system C expert system D neural network|*|CPS5-CH9|*| Which of the following is NOT a ERP support activity? Pages 364-366 A procurement B administrative C customer service D infrastructure || Systems that focus on the specific needs of the individual departments and are not designed to communicate with other systems are known as __ systems. Pages 367,369,372 A vanilla B stand-alone C legacy D custom ||Which of the following is NOT one of the general types of plans developed with the SCP process? List page 389 A distribution planning B production scheduling C sales planning and forecasting D procurement planning ||Which of the following was NOT listed as one of the benefits of a CRM system? Table 9.4 A individualized service B speeds processes C improved communication D improved planning ||Which of the following is NOT one of the enterprise wide changes that must be included in a successful CRM strategy? List page 380 A marketing plan changes B customer service changes C employee training changes D policy and business process changes ||Which of the following was NOT listed as one of the challenges in implementing enterprise systems? List page 396; discussion pages 396-398 A secure executive sponsorship B get help from outside experts C thoroughly train administrators D look beyond the company's immediate needs ||Which of the following would NOT improve SCM efficiency? Table 9.23 A fewer warehouses B less inventory C faster delivery times D fewer facilities ||Systems for providing efficient and effective communication with the customer from the entire org anization are referred to as ___ CRM. List page 381; discussion pages 381-385 A analytical B external C operational D collaborative|*|CPS 6-CH10|*| ____ maintenance involves making changes to a system to reduce the chance of future system failure. Table 10.9 A adaptive B corrective C perfective D preventive ||___ is NOT a type of outsourcing relationship. Page 440 A basic B special C preferred D strategic ||Which of the following was NOT listed as a good reason to outsource some (or all) of a firm's IS services? Page 438 A financial factors B regulatory factors C organizational culture D supplier pressures Which of the following is not one of the 5 general steps most competitive external acquisition processes follow? Page 434 A proposal evaluation B system analysis C system acquisition D vendor selection ||When a software system is converted in a branch office BEFORE being implemented company-wide, the company is using a ___ conversion plan. Figure 10.18 A parallel B direct C pilot D phased ||Which of the following was NOT listed as a benefit of end-user application development? Pages 441-443 A long development time B reduces cost of labor C ensures continuity D avoids IS developer work overload ||Developing database tables and their relationships would occur during the systems ___ phase of the SDLC. Pages 412-424 A planning and selection B analysis C design D implementation |*|CPS7-CH11|*| Information ___ is concerned about what information a person or organization has the right to obtain about others. Discussion pages 459-168 A property B accessibility C privacy D rights ||The ___ prohibits the dissemination of computer viruses and other harmful code. Discussion pages 472-473; 478 A No Electronic Theft Act B Electronic Communications Privacy Act C Computer Fraud and Abuse Act D ||Computer Software Copyright Act ___ break into computer systems to promote political or ideological goals such as free speech, human rights, and antiwar campaigns. Discussion pages 474-475 A crackers B cyberterrorists C hacktivists D hackers ||Attempting to get financial account information by using a false web site that duplicates a legitimate one is called ____. Table 11.2 A social engineering B spoofing C cloning D phreaking ||__ are most often spread through malicious e-mail attachments or file downloads, can reproduce themselves, and, sometimes, are intended to be harmless pranks. Discussion pages 480-482 A worms B viruses C Trojan horses D logic bombs || Cyberterrorism attacks might take all but which of the following forms? Discussion pages 483-489 A deleting or corrupting vital information B stealing classified files C electronically blinding friend-or-foe identification systems D destroying government computers||Governments accused of having conducted cyberwar deny direct involvement and, in turn, blame ___. Discussion pages 483-489 A cybercriminals B cyberterrorists C patriot hackers D patriot crackers.|*|ACCESS INFO|*| Field Data Types : A characteristic of a field that determines what kind of data it can store. For example, a field whose data type is Text can store data consisting of either text or numeric characters, but a Number field can store only numerical data. Data Types: Attachment, AutoNumber, Currency, Date/Time, Hyperlink, Memo, Number, OLE object, Text, Yes/No Boolean. FIELD PROPERTIES: After you create a field and set its data type, you can set additional field properties. The field's data type determines which other properties you can set. or Number and Currency fields, the Field Size property is particularly important, because it determines the range of field values. For example, a one-bit Number field can store only integers ranging from 0 to 255.The Field Size property also determines how much disk space each Number field value requires. Format: Determines the way that the field appears when it is displayed or printed in datasheets or in forms or reports that are bound to the field. You can define a custom format for a Text field and property to customize the way numbers, dates, times, and text are displayed and printed. Input mask: Displays editing characters to guide data entry. For example, an input mask might display a dollar sign ($) at the beginning of the field and A format that consists of literal display characters (such as parentheses, periods, and hyphens) and mask characters that specify where data is to be entered as well as what kind of data and how many characters are allowed. Caption: The label text that is displayed for this field by default in forms, reports, and queries. If this property is empty, the name of the field is used. Any text string is allowed. Required: Requires that data be entered in the field. Default Value: Automatically assigns the specified value to this field when a new record is added. Validation Rule: Supplies an expression that must be true whenever you add or change the value in this field. Use in conjunction with the Validation Text property. Validation Text: Enter a message to display when a value that is entered violates the expression in the Validation Rule property. Grouping: Right click a column on which you want to group or sort, and then click Group On [field name] or click one of the Sort options. For example, to group on the Priority column, right-click the Priority column and then click Group On Priority.When applying grouping, Access moves the grouping field to the leftmost column, and groups the remaining columns based on that column. In some cases, Access also adds a grand total to the Report Footer section. Aggregate Functions: To summarize all the data in a table, you create an aggregate query that involves a function such as SUM( ) or AVG( ). When you run the query, the result set contains a single row with the summary information. For example, you can calculate the total price of all books in the titles table by creating a query that sums the contents of the price column. EX.. SELECT SUM(price) total_price FROM titles When you use an aggregate function, by default the summary information includes all specified rows. In some instances, a result set includes non-unique rows. You can filter out nonunique rows by using the DISTINCT option of an aggregate function. You can combine aggregate functions with other expressions to calculate other summary values. Concatenation of fields: You can join two strings of text together by using the & operator in an expression. This is called concatenation. For example, the result of both of the following expressions is the text string Hello world! "Hello " & "world!" "Hello" & " " & "world!" You can use concatenation to combine the text in two or more fields into a single text string, and you can display the result in a field in a query, or in a control on a form or report. For example, if you have a table that contains the fields FirstName and LastName, you can use the following expression to create a text string that displays the values of the FirstName and LastName fields separated by a space.[FirstName] & " " & [LastName] Calculated Fields: table fields that calculate values. The calculations can include values from fields in the same table as well as built-in Access functions. EX. [Quantity] * [Unit Price] Filter Criteria: used to limit the number of records that are displayed in a form, query, report, or data access page that is part of an Access database. Report Headers vs Page Headers: Report headers and footers appear at the beginning and end of a printed report. Page headers and footers appear at the top and bottom of each printed page they don't appear in Form view. Report header: A report section that is used to place information (such as a title, date, or report introduction) at the beginning of a report.

Вам также может понравиться