1. Hardware is the physical component of computing and includes technology like the keyboard, mouse, monitor, hard drive, etc. You looked at the hardware in a management information system. Without physical hardware, software cannot perform the function it is programmed for.
Prepare for the final exam by reviewing the sections for "Motherboard", "Random-Access Memory", "Hard Disk", and "Removable Media" in Hardware.
2. Software is the second component of a management information system. Software is designed to perform a certain function and relies on the compatibility of the hardware to perform that function.
Refer to "Types of Software" and "Utility Software and Programming Software" in Software for more information and details about various software types.
The basic components of a computer are the CPU, memory, circuit board, storage, and input and output devices. Every digital device uses the same type of components. The CPU is known as the brains of a device; it carries out the commands performed in software by returning a result to be acted upon.
Read the following sections in Hardware to refresh your memory about the various components of a computer: "Network Connection", "Removable Media", "Sidebar: Moore's Law", and "Processing Data: The CPU".
1. Software can be divided into two main categories: operating systems software and application software. Both types of software serve as interfaces between the user and the hardware.
2. Application software provides a solution to a computer user's need or goal. For example, Microsoft Word is a piece of application software for writing papers, letters, articles, and other forms of written text.
3. Two subcategories of application software are utility software and programming software. Diagnostic applications and antivirus software are examples of utility software that help users fix their computers. Programming software, like compilers, is used to create new applications.
Watch The Software Component again to review operating systems and application software. Additionally, review the sections "Types of Software", "Operating Systems", "Application Software", "The Killer App", "Productivity Software", and "Utility Software and Programming Software" from Software for a deeper look at the two main types of software.
1. Before the invention of cloud computing, software had to be installed on a computer either from a disk or file download. In many cases, purchased software was limited to a single installation per license. With the traditional Microsoft Office suite, you can only install one instance of the suite of programs on one device, but with the cloud-based Office 365, you can run the suite on up to five devices for one monthly subscription rate.
The cloud consists of online applications, services, and data storage. Cloud service providers maintain giant server farms with massive amounts of storage, all connected through Internet protocols.
2. Private clouds help relieve some of the skepticism around cloud computing. Private clouds are specific sections of server space set aside for an organization through the service provider.
3. Virtualization is one technology that is used as part of cloud computing. Virtualization involves creating "virtual machines" that can connect to the Internet or exist on a closed network. With virtualization, a single computer can be used to perform the functions of multiple computers with multiple operating systems.
Open-source software is the result of many programmers who create and share programs they build with the solutions they have discovered. This allows open-source programmers to develop innovative programs and fix errors.
Refer to the sections "Operating Systems", "Software Creation", and "Open-Source Software" in Software for a deeper look at open-source software. Make sure to read the last paragraph under the "Operating Systems" for an overview of the Linux operating system.
Organizational networking consists of four main types of networks: LAN/WAN, Client-Server, Intranet, and Extranet. Each of these networks serves a specific role to organizations to help them reach out to their customers and perform daily operations.
Review "Wireless Networking", "Bluetooth", "VoIP", and the four subsections under "Organizational Networking" in Networking and Communication for a review of the types of networks and networking available for organizations to do business.
Confidentiality, integrity, and availability are the three components that make up the information security triad. Confidentiality ensures access to information is restricted to those who are allowed to view it. Integrity is the assurance that the information has not been changed and represents what it is intended to represent. Availability means that information can be accessed and modified by those authorized to do so.
1. To ensure the components of the security triad can be integrated into a management information system, various security tools should be used to ensure the overall information security of the system is in place. Authentication, access control, and encryption tools are the main categories of information security tools.
If these tasks were difficult for you, you might like to revisit the three subsections under "Tools for Information Security" in Information Systems Security before you attempt the final exam.
2. Backups, firewalls, and intrusion detection systems are also essential tools in information security. Backup plans help protect information in the event of corrupted, deleted, or lost files due to power loss or network intrusion.
In Information Systems Security, re-visit the sections on "Backups", "Firewalls", and "Intrusion Detection Systems".
3. Physical security is just as important as network security. Organizations should implement the best layers of physical security possible. Physical security includes the security of physical hardware and networking components on a network.
Read the sections "Physical Security" and "Security Policies" in Information Systems Security for more details.
4. Personal information security helps protect individuals to secure their computing technologies. Individuals can take several steps to help protect their information and physical devices from being compromised.
Read what some of your fellow students said by visiting the discussion forum. Read the section on "Personal Information Security" in Information Systems Security to learn more steps to take in personal information security.
This vocabulary list includes terms that might help you answer some of the review items above and some terms you should be familiar with to be successful in completing the final exam for the course.