ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems



Similar documents
i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Business Administration of Windchill PDMLink 10.0

R162-2f-206c. Certification of Continuing Education Course. (1) (a) The division may not award continuing education credit for a course that is

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

USING EXCHANGE HOSTED ENCRYPTION

Workflow Administration of Windchill 10.2

Introduction to Windchill PDMLink 10.0 for Heavy Users

List of approved Universities and Programmes by Yayasan Peneraju

Forensic Accounting Taxation

NATO STANDARD AMedP-8.1 DOCUMENTATION RELATIVE TO INITIAL MEDICAL TREATMENT AND EVACUATION

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix

Reg. IV.18.(i). Special Rules: Telecommunications and ancillary service providers. [Adopted July 31, 2008]

BSM 9.0 ESSENTIALS. Instructor-Led Training

Windchill Service Information Manager Curriculum Guide

E-Business, E-Commerce

Automation in Banking, Volume

Book of Needs of the Holy Orthodox Church

Mid Willamette Valley: Community Systems Background Document Marion, Polk, Yamhill, Linn, and Benton counties

Internet, broadband, and cell phone statistics

Audit Committee Charter

C&A MM Inventory Relieve & Post to Job Cost Installation and Setup Instructions with Process Flow

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Arbortext Content Manager Curriculum Guide

John Allan November 5, 1884 Dunphaile Castle IV December 12, 1884 Laurel II January 17, 1885 Umvoti XV January 29, 1885 Dunphaile Castle V March 16,

Windchill PDMLink Curriculum Guide

GUIDELINES FOR ONLINE SUBMISSION OF APPLICATIONS

WILL THE DEADLINE BE EXTENDED?

SAS. 9.4 Guide to Software Updates. SAS Documentation

ACCOUNTING INFORMATION SYSTEMS

DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY, AURANGABAD. PROGRAMME

Music Business Lecturers Oxford, UK Seeking Part-time and casual appointments

Telecommunications, Networks, and Wireless Computing

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Pro/INTRALINK Curriculum Guide

Chapter 5. Data Communication And Internet Technology

CALIFORNIA PUBLIC UTILITIES COMMISSION STAFF REPORT

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Ministry of Social Justice and Empowerment (Department of Social Justice & Empowerment) Government of India

TEXAS A&M FOOTBALL RUNNING BACK DRILLS

ANALYSIS. Vendor Performance: A Shared Responsibility OTTAWA JANUARY 2014 PROMOTING FAIRNESS, OPENNESS AND TRANSPARENCY IN PUBLIC PROCUREMENT

Risk Management Policy

Acknowledgements PART ONE: CONCEPTUAL FRAMEWORK. 1. ERP Systems: An Introduction 3

Contemporary Craft Sector Profile and Analysis

26/10/2015. Enterprise Information Systems. Learning Objectives. System Category Enterprise Systems. ACS-1803 Introduction to Information Systems

TABLE OF CONTENT CHAPTER TITLE PAGE TITLE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Schedule of Bank Charges Schedule of Charges (Excluding FED)

(Academic year)

Deal or Appeal. Thursday, November 16, :30 PM to 5:45 PM Room # B405

CARICOM ICT STATISTICS AND INDICATORS

INSTRUCTIONS TO FILL UNDERTAKING FOR Point to Point (P2P) LEASED LINE NETWORK CONNECTIVITY

Certified Information Systems Auditor (CISA)

PART A: OVERVIEW INTRODUCTION APPLICABILITY OBJECTIVE...1 PART B: LEGAL PROVISIONS LEGAL PROVISIONS...

Information Technology Hardware Technician

Order for Enforcement of the Act on Prevention of Transfer of Criminal Proceeds

Chapter A computer is a collection of computers that communicate with one another over transmission lines.

INTERNAL REGULATIONS OF THE AUDIT AND COMPLIANCE COMMITEE OF BBVA COLOMBIA

CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada

Chapter 7 Information System Security and Control

Local Government Better Practice Guide. Planning and Reporting

72% of Online Adults are Social Networking Site Users

SPECIAL CONDITION OF CONTRACTS

THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL

Policies and Procedures

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

Key facts and statistics about volunteering in Australia

TABLE OF CONTENTS. Simple will with residue pouring over to inter vivos trust

EXECUTIVE SUMMARY. Study Approach. Background. ERP in Concept and in Practice

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

15 Organisation/ICT/02/01/15 Back- up

Case Study. The economic benefits of vocational education and training in South Africa

ACS-1803 Introduction to Information Systems. Enterprise Information Systems. Lecture Outline 6

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 435 DISASTER SIMULATION

UNIT I OVERVIEW OF E- COMMERCE

AL RAFEE ENTERPRISES Solutions & Expertise.

Regulated Nurses, 2012 Summary Report

CompTIA Network+ (Exam N10-005)

Program Learning Objectives

Information Systems and Tech (IST)

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Alberta s Student Teacher Practicum: A Legal Analysis of the Statutory and Regulatory Framework. J. Kent Donlevy

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release June 26, 2013 EXECUTIVE ORDER

Contents. Foreword. Acknowledgments

EIGHTH EDITION. Stephen Haag DANIELS COLLEGE OF BUSINESS UNIVERSITY OF DENVER. Maeve Cummings COLLEGE OF BUSINESS PITTSBURG STATE UNIVERSITY

lesson 1 An Overview of the Computer System

Specific and Miscellaneous Professions

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Usage of Information Technology in the Programs of Music Teaching, Example of Uludag University Turkey

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

PMI-DVC Board of Directors Roles and Responsibilities

Functional Area Systems Production / Operation Systems

26/10/2015. Functional Area Systems Production / Operation Systems. Examples: Functional Area Info Systems. Functional Area Information Systems

Network & Information Security Policy

Transcription:

ACS 1803 Final Exam Topic Outline IV. Functional Area Information Systems a. Financial Information Systems (Lecture Outline 5.1) i. Budgeting Systems ii. Cash Management Systems iii. Capital Management Systems iv. Investment Management Systems b. Production/ Operations Systems (Lecture Outline 5.2) i. Manufacturing Resource Planning (MRP) Systems 1. Bill of Materials (BoM) 2. Capacity Requirements Planning (CRP) 3. Production Planning & Control (PPC) ii. Operational and Tactical Systems iii. Strategic Manufacturing Systems iv. Supply Chain Management (SCM) Systems v. Just-in-Time (JIT) Manufacturing vi. Evolution of MRP2 to ERP c. Marketing Information Systems (Lecture Outline 5.3) i. Contact Management Systems ii. Telemarketing Systems iii. Direct Mail Advertising Systems iv. Delivery Tracking and Routing Systems v. Sales Management/ Forecasting Systems vi. Market Research Systems vii. Customer relationship Management Systems (CRM) d. Human Resources Information Systems (Lecture Outline 5.4) i. Employee Information System ii. Attendance Recording Systems iii. Employee Scheduling Systems iv. Performance Management Systems v. Position Control Systems vi. Recruiting Systems vii. Compensation and Benefits Systems viii. Long Term Workforce Planning Systems ix. Labour Negotiation Support Systems V. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis i. Definition ii. Primary Activities 1 P a g e

VI. 2 P a g e iii. Support Activities iv. Information Systems role in value chain analysis c. Supply Chain management Systems v. Supply Chain concept vi. Supply chain Management 1. Objective 2. Sources of SCM Systems 3. Role of SCM in the Value Chain vii. Supply Network 1. Push-based vs. pull-based network viii. Capabilities of SCM applications ix. SCM Benefits d. Customer Relationship Management Systems (CRM) x. Role of CRM in the Value Chain xi. CRM Software capabilities xii. Operational CRM Systems 1. Sales force automation xiii. Analytical CRM Systems xiv. Business Value of CRM systems xv. CRM Performance measurement xvi. CRM Systems Portal e. Enterprise Resource Planning systems xvii. Definition xviii. Key Characteristics xix. Architecture xx. ERP capabilities f. Implementing Enterprise Systems xxi. Business value of enterprise systems xxii. Issues and challenges with implementing enterprise systems xxiii. Strategy Considerations xxiv. Selection factors for an enterprise system xxv. Success factors for enterprise system implementation g. ERP Related to Value Chain activities Systems that span organizational boundaries a. Vertical area Systems i. Definition of vertical area systems b. Office automation systems c. Geographic Information systems ii. Uses d. Decision Support Systems iii. Definition and Characteristics iv. Structured vs. Unstructured Decisions v. Common Decision Support Systems vi. Components of a DSS

3 P a g e 1. Conceptual Model of a DSS 2. User Interface 3. DBMS 4. Model base Systems a. Examples vii. Model-Driven vs. Data-Driven DSS viii. DSS and MIS 1. Comparison of the two types of systems 2. DSS examples e. Expert Systems ix. Definition x. Knowledge vs. Information xi. System Architecture xii. Structure / Components of Expert Systems xiii. Expert System Examples f. Knowledge Management Systems xiv. Knowledge Managemetn Definitions xv. Data Information Knowledge xvi. Workers and Communities of Practice xvii. Technology to support knowledge Management g. Collaborative Information Systems xviii. Definition xix. Collaboration Technologies (Groupware xx. Group Support Systems 1. Configuration 2. Characteristics 3. GSS Software xxi. GSS Alternatives xxii. Collaborative Information Systems Examples Introducing the computer a. Basic Workings of the computer xxiii. Basic Architecture xxiv. CPU 1. Clock Speed 2. Arithmetic/Logic Unit 3. Control Unit 4. instructions for the CPU a. Two parts of an instruction b. How instructions are read by the CPU xxv. Main and External Memory b. Binary System xxvi. Bit xxvii. Byte (Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte)

c. ASCII System d. Programming a Computer xxviii. Machine language (First Generation) xxix. Assembly Language (Second Generation) One-to-one xxx. Third Generation Language one-to-many 1. Different Types of third generation Languages xxxi. Fourth Generation Software 1. Fourth Generation Languages 2. Application Software a. Types of application Software 3. Procedural vs. non-procedural computing 4. Algorithms e. System Software xxxii. Operating System xxxiii. Utility programs f. Computer Hardware xxxiv. The Motherboard 1. Parts of the motherboard a. Ram b. ROM c. Buses d. Expansion Cards xxxv. Primary Storage xxxvi. Secondary Storage 1. Magnetic Disk 2. Tape 3. Optical Disk 4. Memory Sticks xxxvii. Input/output Devices 1. Definition 2. Types g. Classification of Computers xxxviii. Supercomputers xxxix. Mainframe computers xl. Microcomputers 1. Personal Computers 2. Network Computers 3. Portable Computers 4. Handheld computers VII. Telecommunications Literacy a. Definition and Importance of Telecommunications b. Telecommunications hardware i. Modem ii. Transmission Media 4 P a g e

5 P a g e 1. Cables a. Twisted Pair b. Coaxial c. Fiber Optic 2. Wireless a. Microwaves i. Terrestrial Microwave ii. Satellite Microwave b. Wi-Fi c. Near Field (NFC) d. Bluetooth 3. Bandwidth c. Speed of transmission d. Types of networked computing iii. Centralized Computing iv. Distributed Computing v. Collaborative Computing vi. Cloud Computing e. Types of Computer networks vii. Local Area Network (LAN) 1. LAN Components viii. Wide Area Network (WAN) ix. Global Network x. Value-Added Network f. Networking Fundamentals xi. Servers and Clients xii. Telecommunications Software g. The Internet xiii. Packet Switching xiv. Network Protocols 1. TCP/IP 2. IP Address xv. Internet Transmission Media 1. Dial-up 2. DSL 3. TV Cable 4. Satellite Connections xvi. Connecting The internet 1. Internet Service Provider 2. Network Access Points 3. Routers xvii. Uses of the Internet 1. Telnet 2. File Transfer Protocol 3. VoIP

4. Email 5. Chat 6. World Wide Web a. Hypertext b. HTML c. Web Browser d. Website e. Web Address i. DNS ii. URL f. Email address g. Web Server h. Web Session i. Web Portals 7. Search engines 8. Intranets and Extranets VIII. E-Business / E-Commerce Systems a. Internet and WWW capabilities i. Information dissemination ii. Transaction Support iii. Integration iv. Mass customization v. Collaboration vi. Interactive Communication b. Network Computing Spectrum vii. LAN, Intranet 1. Architecture 2. Intranet Applications a. Collaboration b. Training c. Application Integration d. Real-tie access e. Online Information entry viii. Extranet 1. Definition 2. Benefits 3. Electronic Data Interchange a. Definition b. Value-Added network c. Virtual-private network d. Standards 4. Extranet Applications a. SCM b. Procurement c. Distribution 6 P a g e

d. Real-time info access e. Collaboration f. Enterprise portals c. e-business ix. Definition of e-business 1. Strategy and competitive Advantage 2. How to achieve Competitive advantage *MC x. Electronic Commerce 1. Types of E-commerce a. B2C, B2B, B2E, C2C 2. E-Commerce Strategies a. Brick & Mortar b. Click & mortar c. Click Only 3. Stages of Business to consumer transactions a. E-information b. E-integration c. E-transaction 4. Rules for e-commerce success xi. Internet Commerce xii. Web Commerce 1. Web 2.0 xiii. M-Commerce xiv. Establishing and e-commerce site 1. Web Hosting Services 2. Showing your e-business customer screen 3. Outsourcing Web Operations 4. Designing the website xv. Security 1. General e-business security considerations 2. Denial of service attack 3. Credit Card Fraud and data theft 4. Backups and Disaster Recovery *MC 5. Spyware, Spam and cookies 6. Front & Back-end systems 7. Viruses a. Prevention steps for viruses IX. Auditing of Information Systems a. Two types of auditors i. External auditor ii. Internal Auditor 1. Functions, Definition 2. Mandate of an internal auditor 3. Internal Controls 7 P a g e

8 P a g e a. General Controls b. Controls for a specific System b. The Nature of auditing iii. Four-step Process 1. Planning 2. Collecting Evidence 3. Evaluating Evidence 4. Communicating Audit Results iv. Purpose of the information systems audit v. Areas of Risk in an organization s information systems 1. Overall (General) a. Actual Risks (Examples) b. Controls to counteract those risks c. What an internal auditor does 2. Storage of Data the has been input (data files) a. Actual Risks (Examples) b. Controls to counteract those risks c. What an internal auditor does X. The development of Information Systems a. System Development Lifecycle i. Description / Definition ii. Processes 1. System Investigation a. Problem Definition b. Feasibility study i. Criteria For evaluating a project 2. System Analysis a. System Analyst Functions b. Collecting System Requirements c. Diagraming System Requirements i. Traditional Structured Way 1. Data Flow Diagram 2. Entity Relationship Diagram ii. Object-Oriented Design 1. Objects 2. UML d. Prescribed Diagrams i. Use-case diagram ii. Object class diagram iii. Sequence Diagram 3. System Design a. Definition b. Process followed after system design 4. System Development

5. System implementation a. Programming b. Testing c. Conversion Approaches d. System Documentation i. Documentation Types e. System Training 6. System maintenance a. Maintenance Types XI. XII. Alternatives to Developing Information Systems a. Reasons for considering alternatives b. Three alternatives to Internal Development i. End-user Development 1. Definition 2. Tools 3. Benefits 4. Pitfalls ii. External Acquisition 1. Steps a. Identification, selection and planning b. Analysis c. Request for proposal i. Definition d. Proposal Evaluation i. Creating and weighting evaluation criteria e. Vendor Selection iii. Outsourcing 1. Reasons to consider 2. Arrangement Types 3. Managing the IS Relationship c. IS Consulting iv. Consulting Considerations 1. Four Factors to examine (two examples in each stage) a. The organization b. Current IT Setup c. Information needs d. Immediate Systems Need Ethics and computer Crime a. Information Accuracy i. Definition ii. Sources of Information Errors a. The need for ethical behaviour iii. Definition and examples of ethical/ unethical behaviour 9 P a g e

b. Computer Crime iv. Definition v. Hacking vs. Cracking XIII. Information System Function Within an organization a. Main Duties and Functions b. Organizational Structure i. CIO Responsibilities ii. Operations Division iii. Development Division iv. MIS Steering Committee v. End-User Services (user support) c. Competencies of IS Professionals vi. Technical vii. Business viii. Systems 10 P a g e