Managing Technology and
Information
1
Distinguish between data and
information and explain the role of
management information systems
in business.
2
List the components and different
types of information systems.
3
Outline how computer hardware
and software are used to manage
information.
4
Describe the networking and
telecommunications technology
and types of computer networks.
5
Discuss the security and ethical
issues involving computer
information systems.
6
Explain the steps that companies go
through in anticipating, planning for,
and recovering from information
system disasters.
7
Review current trends in information
systems.
Data – raw facts
and figures
Information –
knowledge gained
from processing data
Information
System –
organized method for
collecting, storing,
and communicating
information on operations
Chief Information
Officer –
executive responsible for
directing information
systems and operations
 Computer Hardware
 Computer Software
 Telecommunications and
Computer Networks
 Data Resource Management
• Operational Support Systems
– Transaction Processing System
– Process Control System
• Management Support Systems
– Management Information System (MIS)
– Decision Support System (DSS)
– Executive Support System (ESS)
• The tangible elements of a computer system
• The components that store and process data,
perform calculations
• Input devices like the keyboard and mouse allow
users to enter data and commands.
• Storage and processing components consist of
the hard drive and other storage components
like flash drives.
•
•
•
•
•
•
Desktop (Personal) Computers
Server
Mainframes
Supercomputers
Notebook Computers
Handheld Devices
• Programs, routines, and
computer languages that
control a computer
• Operating System
– Windows Operating System
– Mac Operating System
• Application Software
– Microsoft PowerPoint
– Quicken
 THE INTERNET
 Local Area Networks (LAN)
 Wide Area Networks (WAN)
 Wireless Local Networks
 Intranets
 Virtual Private Networks (VPN)
 Voice over Internet Protocol (VoIP)
• E-Crime
• Computer Viruses
– Worms
– Trojan Horses
– Spyware
• Use of information systems by employees
and vendors:
– Personal Use
– Privacy
• Organizational use of information:
– Employment records
– Employee monitoring
•
•
•
•
•
•
•
Natural Disasters
90% of firms that
Power Failures
sustained a loss of
critical data went
Equipment Malfunctions
out of business
within two years.
Software Glitches
Human Error
Terrorist Attacks
The most basic precaution – Backup.
• The Distributed Workforce
– Employees who work in virtual
offices
• Application Service Providers
– A firm that provides computers
and application support
• On Demand, Cloud, and Grid
Computing
– Renting software time
Descargar

Document