Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data - Coggle Diagram
Data
data is fed into the device, processed, and finally outputted with new information
Computer
digital devices that you can physically touch
Hardware
send data to the computer
Input Devices
Examples: keyboard, mouse, touch screen, light pen, trackball, tablet, bar code, optical character recognition, magnetic ink.
presents information from the computer
Output Devices
Examples: monitors, printers, voice output devices.
The "brains" of the computer. Performs all the processing.
CPU
Main circuit board. Also referred to as the heart of the computer as everything is connected to it.
Motherboard
Memory which is temporary and volatile. Used for open files, and running programs.
RAM
Storage which is permanent and non-volatile. More capacity than RAM. Used for stored files and data.
Hard Drive (HD)
Takes power and allows the computer to use it.
Power Supply
set of instructions that tell the hardware what to do and is created through the process of programming
Software
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Some examples are Office 365, Google Applications
Cloud Computing
software-as-a-service – is software that is rented rather than purchased. It is subscription based.
SaaS
inter-connected computers for communication
Networks
a network that uses wireless instead of wired technology.
Wireless Network
also called a cellular network is a network operating on a radio frequency (RF) served by a base station.
Mobile Network
The Internet is a collection of interconnected networks. A network of networks. No one actually owns or runs the Internet, and each network is administered and funded locally. The Internet is physical
Internet
The “web “is a collection of websites where information is shared via the Internet. The web is not the Internet.
World Wide Web
Information is transferred from one network to another using domain names that are converted to IP addresses by the Domain Name System (DNS) protocol. Address to information on the web.
1 more item...
Uniform Resource Locators – address of a document or site on the Internet.
1 more item...
Hypertext Markup Language is the language used to create webpages.
1 more item...
provides a graphic interface to access information on the web. Examples: Safari, Chrome, Firefox, IE.
1 more item...
crimes committed with the use of a computer
Cybercrime
Security Measures Against Cybercirme
Passwords - a combination of characters that provides access to a system. Multi-factor identification - requires more than two means of authentication - something the user knows (password), what the user has (token), and who the user is (bio-metrics).
Authentication
Access limitation based on roles. Example: Terminal resource security (FOL time out)
Access controls
A process of encoding data upon its transmission or storage so that only authorized individuals can read it.
Data Encryption
An extra copy of the information is stored (usually off-site).
Back-ups
A program designed to prevent, search for, detect, and remove software viruses, and other malicious software. REACTIVE
Anti-virus Programs
Helps to block unauthorized access.
Firewalls
Locked doors, physical intrusion detection (cameras), cable shielding, corner bolts, electronic trackers, ID badges, proximity-release door openers, room shielding, steel encasement and training.
Physical Security
Secure private connections to send information.
Virtual Private Networks
monitors a network or systems for malicious activity or violations and reports to the administrator. PROACTIVE
Intrusion Detection Systems
A database is an organized collection of related information. It is an organized collection, because in a database, all data is described and associated with other data. Databases are not always digital – a filing cabinet, for instance, might be considered a form of database.
Database
A Flat File Database is the opposite of a relational database, and only contains one table. No relationships are present. E.g., a table created in Excel, or a paper phone book. This will have repetition of data, and an increased chance for errors.
Flat File Database
A Relational Database is a system that arranges data according to subject and then brings the data together according to various relationships. It is called a relational database because it uses two dimensional tables, and each table is linked (related) by a common field. E.g. Microsoft Access.
Relational Database
is an input, process, output model, where data is collected, manipulated, stored, and distributed to meet an objective. Information systems help managers to make better decisions.
Information System
Hardware, software, database, and networks
Technology
Tech Enabled Strategy
Productivity Paradox
Simply defined as the output produced per unit of input. Easy to define, and difficult to measure.
Output should also consider value and input should consider both quantity and quality.
Productivity
Technologies that impact an entire economy, are widely used, and have the capacity to impact economic and social structures.
General Purpose Technology (GPT)
Refers to the slowdown in productivity growth despite large investments in technology.
Productivity Paradox
The ability to sustain profits that exceed average for the industry.
Competitive Advantage
is a strategy that aims to distinguish a product or service from other similar products offered by competitors in the market. It entails development of a product or service that is unique to the customers in terms of product design, features, brand image, quality, price, or customer service. (EX: Apple)
Differentiation
is a strategy companies use to increase efficiencies and reduce production costs below the industry average or their closest competitor. (EX: Walmart)
Cost Leadership
is developing, marketing and selling products or services to a niche (specialized) market such as a particular type of customer, specific product line, or targeted geographical area. (EX: ebay, Hallmark)
Focus
is a process that is focused on achieving a goal for a business. Some businesses see their processes as a strategy for achieving competitive advantage.
Business Process
4 more items...
Emerging Technology
is the simulation of human intelligence processes (such as, thinking, speaking, feeling, and reasoning) by machines.
Artificial Intelligence (A.I.)
system that is designed and trained for a particular task. E.g. virtual assistants. Also referred to as weak A.I.
Narrow A.I.
system with generalized human cognitive abilities. A strong system will find a solution without human intervention. Also referred to as strong A.I.
Broad A.I.
Artificial Intelligence as a Service - software systems that provide access to A.I. components.
AIaas
a set of instructions to complete a task. Executed under certain circumstances. Condition/Action
Algorithm
where machines are augmented with wireless connectivity and sensors, connected to a system that can visualize the entire production line, control, and make decisions on its own.
Industry 4.0
Types of Artificial Intelligence
designed for narrow purposes and cannot easily be applied to another situation. E.g. IBM Deep Blue & Alpha Go
1 more item...
use past experiences to inform future decisions, however observations are not stored permanently. E.g. Self-Driving Cars
1 more item...
refers to the understanding that others have their own beliefs, desires and intentions that impact the decisions they make.
1 more item...
systems have a sense of self, have consciousness.
1 more item...
A.I. Technology
11 more items...
roles individuals play in information technology
People
steps towards desired goal
Process
The process of creating a new, or updating an existing information system. Despite the wide-spread use of information systems, many development projects fail.
Systems Development
A multi-step , iterative process that provides a framework for developing a new system or project. There are different definitions of the process, but it usually follows the stages below (some stages may be combined). It is also referred to as the waterfall approach as each step is separate and must be completed before moving on.
Systems Development Life Cycle
Determine the scope of the project. What is the problem? How is it being handled currently? Do we need, or want a solution?
Determine feasibility. Answer the questions: Who, What, Why and When.
Planning / Preliminary Analysis
What must the system do to solve the project. Work with stakeholders to Generate requirements. Analyze needs of end users.
System Analysis
How will the system do what it must to solve the problem. Choose a solution. Description of specifications, and features.
Design
Code is written based on the SDLC requirements document. This may be in-house or third party developers.
Programming
A series of structured tests are designed to find errors and bugs. User testing has many stages and takes time to complete.
Testing
After installation and testing is complete, the system will be put into place. Implementation considerations include: new equipment, new employees, training, physical layout, data preparation/conversion, safeguards/security.
Implementation
Review system and add new requirements. Meet with users and review performance metrics. Structured support process ensures timely feedback for system updates.
Maintenance
Impacts of Information Systems
property (as an idea, invention, or process) that derives from the work of the mind or intellect (covers: patents, trade secrets, trademarks, copyright).
Intellectual Property & Copyright
creates protection for someone who invents a new product or process.
Patent
is a word, phrase, logo, shape or sound that identifies a source of goods or services.
Trademark
is the protection given to songs, computer programs, books, and other creative works; any work that has an “author” can be copyrighted to protect against reproduction, and distribution with permission.
Copyright
copyright licenses that enable the free distribution of an otherwise copyrighted "work" while maintaining control for the author.
Creative Commons
is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. For instance, education.
Fair Use
unauthorized use, duplication or distribution of copyrighted software.
Piracy
is when someone registers, sells or uses a domain name (internet) to profit from someone else’s trademark.
Cyber -squatting
Information System Issues
is preventing access to content (e.g. internet filters for children)
Censorship
is the idea that anything posted online remains FOREVER.
Digital Legacies
between the information rich and the information poor.
Digital Divide
is a mental condition characterized by excessive use of the internet, usually to the detriment of the user.
Internet Addiction
Technology is becoming ubiquitous which removes the boundary between work and life. Many now work from home or a virtual office
Work/Life Balance
technology has been known to cause: vision, musculoskeletal, skin, reproductive, and stress-related health issues.
Health Impacts
the design, manufacture, use and disposal of computers so that there is minimal impact on the environment.
Green Computing
electronic commerce is the buying and selling of goods and services over the Internet and encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.
E-Commerce & E-Business
E-Commerce Categories
Business to Business - businesses buying and selling over the internet. Represents 80% of all e-business.
B2B
Business to Consumer - businesses buying and selling to a consumer over the internet.
B2C
Consumer to Businesses - consumers buying and selling to a business over the internet.
C2B
Consumer to Consumer -consumers buying and selling to other consumers over the internet.
C2C
E-Commerce Models
transfers the traditional "brick & mortar" business online
Merchant Model
collects commissions on transactions.
Brokerage Model
provide advertising online
Advertising Model
revenue from more than one source
Mixed Model
collect and sell information
Infomediary Model
sell digital products & services
Subscription Model
Electronic Payment Systems
Electronic funds transfer.
EFT
size of a credit card with financial information stored on a chip
Digital Cash: Smart Card/Prepaid Card
usually works with a smart card, and amount of cash can be recharged
E-Cash
Cell Phone payment
E-Wallets or Virtual wallets
online payment system
Paypal
small transactions on the web
Micropayments
electronic currency.
BitCoin