IS 301 Exam 3 Study Guide Ekedahl EXAM FORMAT The exam will contain True / False, Multiple Choice, and possibly matching questions. In addition, there will be 3-5 short answer questions. For the short answer questions, you will write no more than a paragraph or two. Paper will be provided for the short answer questions. You do not need a blue book. I will provide a scantron. The exam is closed book. However you may bring 1 page (2 sides) of notes on an 8 ½ x 11 piece of paper. TIPS At the end of each chapter, key terms are presented, along with a reference of where those key terms are defined. Review these key terms and definitions. The chapter summary items also provide good concise answers for the types of conceptual questions that you are likely to see on the exam. Web Assignment You should be able to discuss the terminology covered in the Web assignment. You should also be able to work with an activity diagram, understand the symbols that make up an activity diagram, and the purpose of swimlanes. Chapter 9 – Customer Relationship Management and Business Intelligence Be able to list and describe the business benefits that can be achieved by using a CRM system. o Recency o Frequency o Monetary value Understand the functions provided by an operational and analytical CRM. o Sales management o Contact management o Opportunity management Understand what is meant by the terms cross-selling and up-selling. Be able to list and describe CRM metrics (Figures 9-10 and 9-11) Understand what is meant by the term business intelligence. How is business intelligence used at the operational, tactical, and strategic level. Know what is meant by the terms data latency, analysis latency, and decision latency. Be able to discuss the following approaches to data mining. o Classification o Estimation o Affinity grouping o Clustering Understand the benefits of business intelligence and how an ERP can improve business intelligence. Chapter 10 – Enterprise Resource Planning and Collaboration Systems Understand the benefits of an ERP. o Consolidation of incompatible departmental applications. o An up-to-the minute view of an organization. o List and describe the core ERP components. Core (Finance, production, HR) Extended (BI, CRM, SCM) o Understand the concept of middleware Financial analysis o Be able to describe net present value and return on investment o Be able to describe collaboration systems and the types of collaboration systems. Knowledge management systems Content management systems Workflow management systems Groupware o Be able to describe the difference between explicit knowledge and tacit knowledge Chapter 11 – Systems Development and Project management Be able to describe the systems development lifecycle and the steps involved in the SDLC o Planning o Analysis o Design o Development o Testing o Implementation o Maintenance Know the difference between traditional waterfall development and agile software development methodologies o Rapid application development o Extreme programming o SCRUM methodology Be able to describe the fundamentals of project management and how strategic projects are chosen. Understand the purpose of Gantt and Pert charts Know the possible risks and benefits of outsourcing projects. Chapter 4 – Ethics and security Selected computer privacy acts were discussed in class. Be able to discuss, in general, the purpose of the following acts: (These appear on pages 136 and 137) o Freedom of information act o Privacy act of 1974 o Electronic Communications privacy act off 1986 Understand ethical issues as they apply to the information age o Rights and responsibilities of privacy with respect to corporate and personal data. Be able to describe the rights provided by: o Copyrights o Patents o Trade secrets Be able to describe the different types of denial-of-service attacks o Single message attack o Message-stream attack o Distributed attacks using zombies Be able to list and describe the two types of firewalls Encryption o Parts of an encryption system Algorithms Keys o Type of keys Symmetric Asymmetric (public and private keys) Know how social engineering can be used to gain access to systems. Be able to discuss the purpose of an information security plan and what should be contained in such a plan. Be able to discuss the effects of employee monitoring.
Pages to are hidden for
"Is301 Exam3 Study Guide"Please download to view full document