PROF. Meledath Damodaran COSC 3325 FINAL EXAM REVIEW &amp

PROF. Meledath DamodaranCOSC 3325 FINAL EXAM REVIEW & STUDY GUIDESUMMER 2015SATURDAY August 1st 9:00 – 10:30 AMThe test will have 40 multiple-choice questions selected randomly from a set of 100 multiplechoice questions from Chapters 7-12 distributed as follows. Time allowed is ONE HOUR ANDTHIRTY MINUTES.The format of the exam will be similar to that of the midterm. I would still caution you of theimportance of time management and studying the following terms and concepts (in this reviewguide) thoroughly and in depth as if it is a closed book exam. The “Suggestions and Strategiesfor the Exam” that I gave at the end of the midterm review guide are still valid for this exam. Inparticular do not skip any question; I do not penalize for wrong answers. You may also want tosave the answers as you go.Just like the midterm you must start the exam within ½ hour of the start of the scheduled 1 ½hour period; once you start the exam you will have the full 1 ½ hours available to you from yourstarting time.You will not be allowed to start the exam after 9:30 AM sharp.As before you will be able to get to the exam by clicking on “Assessments” and selcting “FinalExam”(or the direct link for Final Exam if there is one) and the exam will be ready for you at9:00 AM SHARP. I plan to be around (via Blackboard email if necessary) starting a few minutesbefore the starting time of the exam – for any emergency.We expect students in this class to have a computer with a reliable Internet connection or makeprior arrangements to be able to use one. Finally I will not be able to make any adjustments tocases such as forgetting the exam time/date or missing the exam because “something urgentcame up.”Final Exam Review and Study GuideQuestion DistributionChapter789Number of Questions in Test Bank181523 PROF. Meledath Damodaran10111292114Studying the following terms concepts and ideas will help you review and prepare for the exam.You will be well served to study all aspects of these concepts and terms all that you can learnabout them from the textbook and notes in detail and in depth and not just the definitions.If you do not find a term or concept while reading the chapter you can easily find the pagenumber(s) by looking up the index at the end of the book.Chapter 7Electronic business SystemsEnterprise resource planningCustomer relationship management (CRM)Supply chain managementElectronic commerceCross­functional application of e­businessEnterprise application integrationTransaction processing cycle.Enterprise collaboration systems.Functional business systemsFinance business functionHuman resource managementProduction/operations business functionMarketing business functionComputer­integrated manufacturing (CIM)Computer­aided manufacturing systems.Accounting information systems.Chapter 8Categories of electronic commerce applications:Business­to­consumer business­to­business andConsumer­to­consumer.Nine key components of an E­com process architectureWorkflow managementEFTSecure electronic paymentE­commerce success factorsBuilding an E­commerce websiteChapter 9Three levels of management decision makingStructured semistructured unstructured decisionsManagement reporting alternativesOnline analytical processing & associated operationsComponents & characteristics of decision support systemsTypes of analysis (analytical modeling activities)EIS PROF. Meledath DamodaranArtificial intelligenceNeural networks systems.Fuzzy logic systems.Expert systems.Virtual reality systems.Genetic algorithm systems.Intelligent agentMethods of knowledge representationChapter 10PrototypingFeasibility studyThe systems analysis stageSystems designEnd user developmentThe systems implementation stageTesting of information systemsSystem conversionChapter 11Business ethics: stockholder social contract andStakeholder theoriesFour major principles of technology ethics:Proportionality informed consent justice andMinimized riskAITP standards of professional conductComputer crimeHackingTrojan horseWar dialingBack doorUnauthorized use of computer systems at workVirusPrivacyComputer profiling and computer matchingSpammingFlamingEmployment challengesEncryptionFirewallDenial of service assaultsSecurity managementChapter 12The book’s approach to managing information technologyThe business/IT planning process & its major componentsOutsourcingApplication development managementIS operations management PROF. Meledath DamodaranHuman resource management of ITCIOGlobal IT managementGlobal IT management challengesTransnational international and global strategiesGlobal IT platformsTransborder data flowsSystems development strategies in global IT