closing august 9, 2011 the internet administration final i’ll post final grades by wednesday...

94
Closing August 9, 2011

Post on 19-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Slide 2
  • Closing August 9, 2011
  • Slide 3
  • The Internet
  • Slide 4
  • Administration Final Ill post final grades by Wednesday night on my Web site. You have ONE DAY to argue anything. Ill send in the final grades, Friday morning.
  • Slide 5
  • Animal Lingo
  • Slide 6
  • AWARDS!
  • Slide 7
  • Most Visited
  • Slide 8
  • Furthest Away Visitor
  • Slide 9
  • Most Impulsive Game Moose
  • Slide 10
  • Most Frustrating Game Penguin
  • Slide 11
  • Cutest Tarsier
  • Slide 12
  • Best Looking Dragon
  • Slide 13
  • Best Overall Catty Care Corner
  • Slide 14
  • Most Sold giraffe 2 X Fujitsu ScanSnap S1500 Instant PDF Sheet-Fed Scanner for PC $800+
  • Slide 15
  • Future
  • Slide 16
  • Jeopardy!
  • Slide 17
  • Slide 18
  • The Internet Data Management Applied Systems 10 Point 20 Points 30 Points 40 Points 50 Points 10 Point 20 Points 30 Points 40 Points 50 Points 30 Points 40 Points 50 Points Globalization and SOA MIS Systems Analysis And Design 10 Point 20 Points 30 Points 40 Points 50 Points Other 10 Point 20 Points 30 Points 40 Points 50 Points
  • Slide 19
  • Slide 20
  • Make Your Bid!!
  • Slide 21
  • Remember this guy?
  • Slide 22
  • How can you avoid this type of attack?
  • Slide 23
  • Install updates to your software and system!
  • Slide 24
  • Thanks for Playing! And remember to use Green IT!
  • Slide 25
  • Define MIS.
  • Slide 26
  • Solving real world problems using technology!
  • Slide 27
  • List two careers someone with a degree in MIS can have?
  • Slide 28
  • Business Analyst Business Application Developer IT Consultant Systems Analyst IT Development Project Leader Database Administrator Business Intelligence Analyst Systems Developer Database Analyst Web Developer Network Administrator Technical Support Specialist Information Systems Manager IT User Liaison Auditor Entrepreneur
  • Slide 29
  • What does MIS stand for?
  • Slide 30
  • Management Information Systems
  • Slide 31
  • How is MIS different from computer science?
  • Slide 32
  • Slide 33
  • Name one finished technology that we developed and sold at the MIS department at the U of A.
  • Slide 34
  • Copy Link Group Systems
  • Slide 35
  • What is the difference between Web 1.0 and Web 2.0?
  • Slide 36
  • Web 1.0 Provides info in simple HTML format, more like finding published content online View pages passively, no interaction with publisher Web 2.0 Interactive websites** Accessibility Crowd-sourced content** Collaboration** Social interaction** Easily-manipulable info
  • Slide 37
  • Name three ways to make money online.
  • Slide 38
  • Sell products Sell services Subscriptions Advertising Affiliate programs
  • Slide 39
  • Define the Long Tail.
  • Slide 40
  • The statistical property that a larger share of population rests within the tail of a probability distribution than observed under a 'normal' or Gaussian distribution
  • Slide 41
  • List the three rules of the long tail.
  • Slide 42
  • Rule 1: Make Everything Available Rule 2: Cut the Price in Half; Now Lower it. Rule 3: Help Me Find it.
  • Slide 43
  • List a type of e-commerce.
  • Slide 44
  • Business-to-Consumer Business-to-Business Consumer-to-Consumer Business-to-Employee E-Government Mobile Commerce
  • Slide 45
  • According to Friedman, what are four flatteners that have lead to globalization?
  • Slide 46
  • Fall of the Berlin Wall Availability of Netscape Workflow Software Uploading Outsourcing Off-shoring Supply Chain Management Insourcing Informing The Steroids
  • Slide 47
  • What are some signs that the worlds is not Flat according to Thomas Friedman?
  • Slide 48
  • People are too sick People are too disempowered People are too frustrated
  • Slide 49
  • How can you benefit from the flat world?
  • Slide 50
  • You can compete with anyone!
  • Slide 51
  • What are the benefits of a Service Oriented Architecture?
  • Slide 52
  • Improved integration and interoperability Inherent reuse Inherent reuse Streamlined architectures, standards, and solutions Leverage existing legacy code Establishing standardized XML data representation Best of the breed Agility Business Intelligence -> Collaborative Intelligence Integration Internal cloud -> external Make to order vs. make to stock Micro-business and micro-outsourcing Co-creation Customer-driven innovations and delivery
  • Slide 53
  • Define Service Oriented Architecture.
  • Slide 54
  • Deployment of loosely coupled services to complete a business process, independent from the specific technologies or platforms used
  • Slide 55
  • Name an application of HCI or interface design?
  • Slide 56
  • Medical Web development Technology development etc.
  • Slide 57
  • What are the four steps of Search Engine Optimization (SEO)?
  • Slide 58
  • Pick keywords On Page optimization Get people to link to you Social interaction
  • Slide 59
  • What is wrong with this ER diagram?
  • Slide 60
  • Missing Cardinalities
  • Slide 61
  • What are the cardinalities for the following weak entity class?
  • Slide 62
  • Slide 63
  • When you convert the following ER diagram to a relational schema, how many tables will you have?
  • Slide 64
  • 4
  • Slide 65
  • When you convert this ER diagram to a relational schema, where would the foreign key go?
  • Slide 66
  • In the Courses table
  • Slide 67
  • What is the difference between Descriptive and Predictive data mining?
  • Slide 68
  • Prediction Methods: Use some variables to predict unknown or future values of other variables. Description Methods: Find human-interpretable patterns that describe the data.
  • Slide 69
  • What is the difference between a decision support system and an expert system?
  • Slide 70
  • Decision Support Systems combine models and data in an attempt to solve semi structured and some unstructured problems with extensive user involvement Expert Systems are computer systems that attempt to mimic human experts by applying expertise in a specific domain
  • Slide 71
  • List an example of an expert system?
  • Slide 72
  • Deep Blue Topio Deception Detection Avatar Watson
  • Slide 73
  • Expert systems use artificial intelligence to make decision. What is the difference between the hill-climbing and the genetic algorithm?
  • Slide 74
  • Exploitation (mate) and exploration (mutation)
  • Slide 75
  • In reference to knowledge management systems, what is the difference between explicit and tacit knowledge?
  • Slide 76
  • Explicit Knowledge: Deals with more objective, rational, and technical knowledge Tacit Knowledge: The cumulative store of subjective or experiential learning
  • Slide 77
  • What is the bullwhip effect, and how can supply chain management, enterprise resource management, or customer relationship systems help?
  • Slide 78
  • The oscillating demand magnification upstream in a supply chain
  • Slide 79
  • What is the difference between the waterfall approach and interactive and incremental development in systems analysis and design?
  • Slide 80
  • Slide 81
  • What happens in the planning phase?
  • Slide 82
  • . Define the Problem 2. Produce the Project Schedule*** 3. Confirm Project Feasibility 4. Staff the Project 5. Launch the Project
  • Slide 83
  • Slide 84
  • What is wrong with this event table?
  • Slide 85
  • A
  • Slide 86
  • What is wrong with this diagram?
  • Slide 87
  • Black hole? Also...what is a miracle in DFD fragments?
  • Slide 88
  • What is are the three constraints focused on in project management?
  • Slide 89
  • Slide 90
  • What are the three phases of e- government?
  • Slide 91
  • 1. Publish Canada has one of the best portals for governmental info in the world 2. Interact Namibian Parliament allows people to participate in political discussions through its website 3. Transact Vietnamese website offers one-stop shopping for businesses and investors seeking to obtain government licenses
  • Slide 92
  • How do you prevent hackers from sniffing your internet activity?
  • Slide 93
  • Use a secure wireless network!
  • Slide 94
  • List one difference between a virus and a Trojan horse?
  • Slide 95
  • A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.