WGU C724 QUESTIONS AND ANSWERS LATEST UPDATE
Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6)
Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection, Solution Implementation
Hard Data Network System Security Ecommerce (IS elements)
Hard...
Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6)
Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection,
Solution Implementation
Hard Data Network System Security Ecommerce (IS elements)
Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions,
Security and Ethics, Ecommerce and Social Meida
System that accepts input data and processes it into information as output
Information System
Information that have been organized to provide value to an organization
Data
Information systems accept _____ as input and process it into ______ as output.
data,information
The primary component categories that make up a Computer-based Information
System (CBIS)
(PPHSND) people, processes, hardware, software, networks, and data
Utility Software
Programs perform periodic system maintenance activities, such as virus detection,
storage space consolidation, backup and recovery, intrusion detection, and access
authentication monitoring
Information systems specialists
People who develop, operate, and maintain the systems. Specialists include
programmers, systems analysts, testers, computer operators, and other managerial IS
personnel
Transaction processing systems (TPS)
This system tracks the flow of daily routine transactions that are necessary to conduct
business, such as payroll or order processing
Management information systems (MIS)
This system provides first level managers with reports on current performance and
historical records to help keep an organization running smoothly
Decision-support systems (DSS)
This system provides modeling and analytical tools that support middle to senior
managers in all aspects of the decision making process, when problems are unique,
unstructured, and not easily specified in advance, to project potential future trends
Executive information systems (EIS)
This system supports senior executives by providing important data in the form of
graphs and charts to analyze and identify long-term trends
IS 4 pyramid
, TPS, MIS, DSS, EIS
The IS function is _____ in structure and its success depends on its cooperation
and relationship with the other functions in an organization
Horizontal
About one third of the IS management agenda is expected to change every _____
______ , confirming the highly dynamic nature of the IS management function.
Three years
Example of IS helping HR
Monthly payroll
Playboys Produced Hotdogs Since Nutritionists Died (IS)
People, processes, hardware, software, networks, and data
Hotdogs Since Nutritionists Died (IT = Sub of IS)
Hardware, software, networks and data
Information Technology is a subset of ______
Information Systems
HTTP
Hypertext Transfer Protocol is the communications protocol at the foundation of all
communication of the World Wide Web
HTTPS
Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as
Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt
data between the user and Web server
FTP
File Transfer Protocol = An unsecure method used to transfer files from one computer to
another.
SFTP
Secure File Transfer Protocol = Much like HTTPS, SFTP uses secure technologies, this
time Secure Shell (SSH), to secure the connection for transferring files from computer to
computer
DHCP
Dynamic Host Configuration Protocol = A DHCP server or appropriately configured
router automatically and temporarily assigns IP addresses to DHCP-enabled systems
on the network
SMTP
Simple Mail Transfer Protocol = One of several popular email protocols in use today
(others include IMAP and POP3)
SNMP
Simple Network Management Protocol = Information concerning network status that is
periodically passed between a network management server and routers on a network,
for the purpose of monitoring network status
TELNET
An early and insecure remote access protocol used to allow a user to log on to a remote
system. Many newer, more secure and more modern forms exist, including secure shell
(SSH) and Remote Desktop Protocol (RDP)
DNS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £6.19. You're not tied to anything after your purchase.