Vous êtes sur la page 1sur 13

5

1
r
e
t
p
a
h
C

Managing Technology and


Information

s
l
a
o
G
g
n
Learni
1

Distinguish between data and


information and explain the role of
management information systems
in business.

List the components and different


types of information systems.

Outline how computer hardware


and software are used to manage
information.

Describe the networking and


telecommunications technology
and types of computer networks.

Discuss the security and ethical


issues involving computer
information systems.

Explain the steps that companies go


through in anticipating, planning for,
and recovering from information
system disasters.

Review current trends in information


systems.

s
m
e
t
s
y
S
n
o
i
t
a
m
r
o
f
In

Data raw facts


and figures

Information
knowledge gained
from processing data

Information
System
organized method for
collecting, storing,
and communicating
information on operations

Chief Information
Officer
executive responsible for
directing information
systems and operations

f
o
s
t
n
e
n
o
Comp
s
m
e
t
s
y
S
n
o
i
t
a
m
r
o
f
n
I

Computer
Computer Hardware
Hardware

Computer
Computer Software
Software

Telecommunications
Telecommunications and
and
Computer
Computer Networks
Networks

Data
Data Resource
Resource Management
Management

n
o
i
t
a
m
r
o
f
n
I
f
o
s
e
p
y
T
Systems
Operational Support Systems
Transaction Processing System
Process Control System

Management Support Systems


Management Information System (MIS)
Decision Support System (DSS)
Executive Support System (ESS)

e
r
a
w
d
r
a
H
r
e
t
u
p
Com
The tangible elements of a computer system
The components that store and process data,
perform calculations
Input devices like the keyboard and mouse allow
users to enter data and commands.
Storage and processing components consist of
the hard drive and other storage components
like flash drives.

s
r
e
t
u
p
m
o
C
f
o
s
e
p
Ty

Desktop (Personal) Computers


Server
Mainframes
Supercomputers
Notebook Computers
Handheld Devices

e
r
a
w
t
f
o
S
r
e
t
u
p
Com
Programs, routines, and
computer languages that
control a computer
Operating System
Windows Operating System
Mac Operating System

Application Software
Microsoft PowerPoint
Quicken

s
k
r
o
w
t
e
N
r
e
t
u
p
m
Co
THE INTERNET
Local Area Networks (LAN)
Wide Area Networks (WAN)
Wireless Local Networks
Intranets
Virtual Private Networks (VPN)
Voice over Internet Protocol (VoIP)

s
e
u
s
s
I
y
t
i
r
u
c
Se
E-Crime
Computer Viruses
Worms
Trojan Horses
Spyware

g
n
i
t
c
e
f
f
A
s
e
u
s
s
I
l
a
Ethic
s
m
e
t
s
y
S
n
o
i
t
a
m
r
Info
Use of information systems by employees
and vendors:
Personal Use
Privacy

Organizational use of information:


Employment records
Employee monitoring

y
r
e
v
o
c
e
Disaster R
p
u
k
c
a
B
&

Natural Disasters
90%
90% of
offirms
firmsthat
that
sustained
Power Failures
sustainedaaloss
lossof
of
critical
critical data
datawent
went
Equipment Malfunctions
out
out of
of business
business
within
within two
two years.
years.
Software Glitches
Human Error
Terrorist Attacks
The most basic precaution Backup.

s
m
e
t
s
y
S
n
o
i
t
a
m
r
o
f
In
Trends
The Distributed Workforce
Employees who work in virtual
offices

Application Service Providers


A firm that provides computers and
application support

On Demand, Cloud, and Grid


Computing
Renting software time

Vous aimerez peut-être aussi