IT Cheat Sheet
IT Cheat Sheet
IT Cheat Sheet
Summary
• Subsystem: a system performs a limited task that produces an end result, which must be
combined with other products from other systems to reach an ultimate goal
• Enterprise application systems (SCM or ERP) tie together different functional areas of a
business
• ISs are used in many business functions, including accounting, finance, marketing, and
human resources
• IT has created societal concerns regarding privacy, identity theft, spam, and Web
annoyances
Summary
• Some information systems have become strategic tools as a result of strategic planning;
others have evolved into strategic tools
• Strategic advantages from information systems are short-lived; new opportunities must
always be sought
• Must keep systems on the leading edge to maintain strategic advantage
Summary
• Supply chain management (SCM) systems optimize workload, speed, and cost in
supply chains
• Human resource management systems facilitate staff selection and record keeping
• An enterprise resource planning (ERP) system can encompass all business processes,
but is expensive and challenging
Summary
• Data word: the number of bits the computer can process in a single cycle
• Computer power: measured by its speed, memory size, and number of processor
cores
• When evaluating external storage, consider transfer rate, capacity, portability, and
form of data organization supported
• Direct access storage devices such as RAM, magnetic disks, and optical discs allow
random access
• Information technology may pose health risks such as carpal tunnel syndrome
Summary
• Office productivity tools such as word processors and spreadsheets help improve
worker efficiency
• Hypermedia and multimedia technology are useful for training, education, research,
and business
• Many applications support web services and access to information on the web
Summary
• Network protocols are sets of rules to which all devices on a network must adhere
• Wireless technologies make it easy and affordable to create wireless LANs and
hotspots
• As Internet links become faster, Internet telephony, also known as Voice over Internet
Protocol (VoIP), is gaining in popularity
Summary
• Object-oriented database maintains objects that contain data and procedures that process
them
• Database designers conduct data modeling and create entity relationship diagrams to
plan databases
• Big Data is the collection and storage of ever-more detailed quantities of data
Summary
• A business can maintain its own web server or use a web hosting service
Summary
• Laws governing the collection and manipulation of personal data in the U.S. and European
Union are different
• The U.S. and EU have incompatible data privacy laws, which restrict the flow of personal
data between the U.S. and EU
Summary
• Decision aids include decision support systems, expert systems, group decision support
systems, geographic information systems, etc.
• Most DSSs have three components: data management module, model management
module, and dialog module
• Sensitivity analysis measures how parameters affect results, and allow “what if” analysis
• Expert systems are designed to emulate the knowledge of an expert, using artificial
intelligence techniques
• Neural network software may be integrated into an expert system to emulate learning
• Expert systems are used in narrow domains where decisions are unstructured
• Geographic information systems are used when decisions involve locations and routes
Summary
• Business intelligence (BI) is any information about organization, its customers, or its
suppliers that can help firms make decisions
• Data mining is the process of selecting, exploring, and modeling large amounts of data to
discover previously unknown relationships
• Data mining is useful for predicting customer behavior and detecting fraud
• OLAP either uses dimensional databases or calculates desired tables on the fly
• Drilling down means moving from a broad view to a specific view of information
• Dashboards interface with BI software tools to provide quick information such as business
metrics
• Employee knowledge networks are software tools to help employees find other employees
with specific expertise
Summary
• IT planning is important because of high investment costs and high risk in implementing
enterprise applications
• Systems development life cycle (SDLC) has well-defined phases: analysis, design,
implementation, and support
• Purpose of systems analysis is to determine what needs the system will satisfy
• Implementation includes training and conversion from the old system to the new system
• Agile methods are a popular alternative to traditional systems development life cycle
Summary
• Outsourcing IT services offers possible benefits, such as reduced cost and shortened time
implementing new technologies
• Outsourcing IT services has potential risks, such as loss of control, loss of experienced
employees, and loss of competitive advantage
• Licensing software advantages include software being immediately available and low-
priced
• User application development has advantages, e.g., short lead time, good fit, and freeing
IT staff
• Employees should not use their computers for anything but work