question archive 5-1 What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components
Subject:ManagementPrice: Bought3
5-1 What are the components of IT infrastructure?
• Define information technology (IT) infrastructure and describe each of its components.
5-2 What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends?
• List and describe the various type of computers available to businesses today.
• Define the client/server model of computing and describe the difference between two-tiered and n-tier client/server architecture.
• List the most important secondary storage media and the strengths and limitations of each.
• List and describe the major computer input and output devices.
• Define and describe the mobile digital platform, BYOD, nanotechnology, grid computing, cloud computing, virtualization, green computing, and multicore processing.
Hand on 5-8
The University of Pittsburgh Medical Center (UPMC) relies on information systems to operate 19 hospitals, a network of other care sites, and international and commercial ventures. Demand for additional servers and storage technology was growing by 20 percent each year. UPMC was setting up a separate server for every application, and its servers and other computers were running a number of operating systems, including several versions of UNIX and Windows. UPMC had to manage technologies from many vendors, including Hewlett-Packard (HP), Oracle Sun, Microsoft, and IBM. Assess the impact of this situation on business performance. What factors and management decisions must be considered when developing a solution to this problem?
8-1, 8-4
8-1 Why are information systems vulnerable to destruction, error, and abuse?
• List and describe the most common threats against contemporary information systems.
• Define malware and distinguish among a virus, a worm, and a Trojan horse.
• Define a hacker and explain how hackers create security problems and damage systems.
• Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.
• Define identity theft and phishing and explain why identity theft is such a big problem today.
• Describe the security and system reliability problems employees create.
• Explain how software defects affect system reliability and security.
8-4 What are the most important tools and technologies for safeguarding information resources?
• Name and describe three authentication methods.
• Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
• Explain how encryption protects information.
• Describe the role of encryption and digital certificates in a public key infrastructure.
• Distinguish between disaster recovery planning and business continuity planning.
• Identify and describe the security problems cloud computing poses.
• Describe measures for improving software quality and reliability.
case study Questions
8-13 List and describe the security and control weaknesses at Sony that are discussed in this case.
8-14 What people, organization, and technology factors contributed to these problems? How much was management responsible?
8-15 What was the business impact of Sony hack? Explain your answer.
8-16 Is there a solution to this problem? Explain your answer.
Review question 9-2, 9-3
9-2 How do supply chain management systems coordinate planning, production, and logistics with suppliers?
• Define a supply chain and identify each of its components.
• Explain how supply chain management systems help reduce the bullwhip effect and how they provide value for a business.
• Define and compare supply chain planning systems and supply chain execution systems.
• Describe the challenges of global supply chains and how Internet technology can help companies manage them better.
• Distinguish between a push-based and a pull-based model of supply chain management and explain how contemporary supply chain management systems facilitate a pull-based model.
9-3 How do customer relationship management systems help firms achieve customer intimacy?
• Define customer relationship management and explain why customer relationships are so important today.
• Describe how partner relationship management (PRM) and employee relationship management (ERM) are related to customer relationship management (CRM).
• Describe the tools and capabilities of customer relationship management software for sales, marketing, and customer service.
• Distinguish between operational and analytical CRM.