Back to Explore

Comprehensive Study Notes — Principles of Information Systems (Selected Weeks) Summary & Study Notes

These study notes provide a concise summary of Comprehensive Study Notes — Principles of Information Systems (Selected Weeks), covering key concepts, definitions, and examples to help you review quickly and study effectively.

1.5k words3 views
NotesQuiz

☁️ Cloud Computing Overview

Cloud computing delivers applications and infrastructure over the web to provide services such as file sharing, data storage/backup, media streaming, website hosting, security, and communication services. Cloud enables rapid provisioning and remote access to computing resources.

🧭 NIST Characteristics of Cloud Services

The U.S. NIST defines core cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. These define how users consume and providers meter cloud offerings.

🧩 Cloud Service Models

  • SaaS (Software as a Service): software delivered remotely via the web.
  • PaaS (Platform as a Service): computing platforms provided for developing and running applications.
  • IaaS (Infrastructure as a Service): outsourced compute, storage, and network equipment. The broader term XaaS (Anything as a Service) captures many specialized variants (IDaaS, DRaaS, DBaaS, Security as a Service).

🏗️ Cloud Deployment Models

  • Public cloud: multi-tenant, owned/managed by a provider; offers elasticity and cost benefits but has concerns like vendor lock-in and variable performance.
  • Private cloud: single-tenant, dedicated resources for one organization (on-prem or VPC managed by a CSP) for added security.
  • Hybrid cloud: integrated public + private clouds connected via private networks to balance cost, elasticity, and sensitivity of workloads. Multicloud strategies use multiple providers to mitigate vendor lock-in and improve resilience.

🤖 Autonomic & Modern Cloud Principles

Autonomic computing aims for systems that self-configure, self-heal, self-optimize, and self-protect via policies and baseline configurations. Modern cloud infrastructures emphasize being distributed (workload spread across devices), immutable (replace rather than modify environments), and ephemeral (short-lived infrastructure/components).

🔁 Cloud Repatriation & Risks

Organizations may perform cloud repatriation (moving workloads back on-prem) due to unexpected costs, privacy concerns, outages, or vendor lock-in. Evaluate total cost, compliance, and resilience when choosing cloud strategies.

🛡️ Other Cloud Offerings and Risks

Specialized cloud offerings include IDaaS, DRaaS, and managed DB services. Note even criminal markets offer services like RaaS (Ransomware as a Service)—highlighting the importance of security controls.

🗄️ Databases & Data Management — Why It Matters

Databases capture operational and consumer data to help leaders understand past performance, diagnose issues, and identify opportunities. High-quality data is accessible, accurate, complete, economical, relevant, reliable, secure, timely, and verifiable, which improves decisions, customer satisfaction, innovation, productivity, and compliance.

🧭 Data Management & Governance

Data management defines processes to acquire, certify, store, secure, and process data to meet user needs. Data governance assigns roles, responsibilities, and processes to ensure data trust and usability; it requires business leadership participation.

👥 Roles: DBA and Data Steward

  • Database Administrator (DBA): designs, implements, tests, monitors, secures, and tunes databases.
  • Data steward: a business-side role responsible for critical data entities, reference/master data, quality checks, and reconciliation.

🔄 Data Lifecycle Management (DLM)

DLM is a policy-driven approach that manages data from creation/acquisition through storage, archiving, and secure deletion when outdated.

🧩 Database Fundamentals & DBMS

A database supports timely, accurate, relevant information. The DBMS provides software to define, access, and manage databases and acts as a single point of control for data resources.

🏗️ Database Design & Modeling

  • Entity: a person, place, or thing (e.g., employee).
  • Attribute: characteristic of an entity (e.g., last name, hire date). Data modeling (enterprise and application-level) identifies entities, attributes, definitions, formats, valid domains, and business rules. ER diagrams visualize entities, attributes, and relationships.

🔑 Data Hierarchy

  • Field (attribute)Record (entity instance)Table (relation).
  • Primary key: uniquely identifies a record.
  • Foreign key: references a primary key in another table to define relationships.

🛠️ Database Activities & SQL

  • Schema: defines tables, fields, and relationships.
  • DDL (Data Definition Language): commands to define database structures.
  • DML (Data Manipulation Language): commands to insert/update/delete data.
  • DCL (Data Control Language): manage privileges (e.g., GRANT).
  • TCL (Transaction Control Language): commit or rollback to maintain integrity. SQL is the primary language for querying and manipulating relational data.

🧹 Data Quality: Cleansing & Enhancement

Data cleansing detects and corrects or removes incomplete/incorrect/inaccurate/irrelevant records. Data enhancement augments records with related information. Cleansing differs from validation; it often requires cross-checking against validated data sets.

🗃️ Relational Databases & Operations

Relational tables use rows (entities) and columns (attributes), with typed columns and constraints. Common operations:

  • Select: filter rows.
  • Project: choose columns.
  • Join: link tables via common fields (primary/foreign keys) to reduce redundancy and answer complex queries.

☁️ Database as a Service (DBaaS) and Popular RDBMS

DBaaS hosts databases on provider servers with administration handled by the provider, reducing in-house maintenance. Popular systems include MySQL, PostgreSQL, Oracle, Microsoft SQL Server, SQLite, MariaDB, IBM DB2, and many specialized/open-source and cloud-native options.

🌐 Network Fundamentals

A computer network connects devices to share data and resources. Communications media carry electronic signals between sending and receiving devices, and protocols are agreed rules for exchanging data. Effective networks enable fast, reliable connections that support modern business operations.

🔺 Network Topologies

Common topologies include star, bus, ring, and mesh. Topology affects performance, fault tolerance, and scalability.

📶 Network Types

  • PAN (Personal Area Network): connects devices near one person.
  • LAN (Local Area Network): within a building or small area; may be peer-to-peer or client/server.
  • WAN (Wide Area Network): spans large geographic areas.

📊 Bandwidth vs Latency

  • Bandwidth: channel capacity (Mbps/Gbps); determines how much traffic can be carried.
  • Latency: round-trip delay (ms); determines responsiveness. Both affect user experience differently.

🔌 Communications Media

  • Twisted-pair wire: common, cost-effective; limited speed/distance.
  • Coaxial cable: cleaner signal, higher speed than twisted-pair.
  • Fiber-optic cable: light-based, very high throughput and low distortion; more expensive to deploy.
  • Wireless: uses radio; includes NFC (very short range), Bluetooth (10–30 ft), Wi‑Fi (IEEE 802.11), RFID (tags/readers for tracking), and cellular (4G/5G).

📡 4G vs 5G

5G offers much higher bandwidth, lower latency (sub-ms targets), and supports many more concurrent devices, but requires more dense infrastructure (smaller cell range).

🧭 Network Software & Protocols

  • Network Operating System (NOS): controls devices on a network.
  • TCP/IP: foundational protocol suite for the internet.
  • OSI model: conceptual seven-layer model to understand layered communication.
  • MAC address: unique physical hardware address. IP address: logical network address (IPv4 32-bit, IPv6 128-bit). Wi‑Fi security evolved from WEP (now insecure) to WPA, WPA2, and WPA3.

🔀 Network Hardware

  • Switch: forwards frames based on MAC addresses; learns device locations.
  • Router: directs packets between networks using routing tables; connects different networks.

🌍 The Internet & World Wide Web

The internet (ARPANET → NSFNET → internet) is the global infrastructure; the Web (HTTP, browsers, servers) is an application layer built on it. DNS maps human-readable domain names to IP addresses; URLs specify resource locations.

🧩 Client/Server & Web Evolution

Client/server architecture supports many clients requesting services from servers. The web advanced from Web 1.0 (static) to Web 2.0 (interactive/social) and toward Web3 (blockchain, decentralized services). Web apps enable e-commerce, streaming, mapping, messaging, and more.

🔒 Intranets, Extranets & VPNs

  • Intranet: private internal web-based network.
  • Extranet: controlled network access for partners/suppliers/customers.
  • VPN: secures communications over public networks using tunneling/encapsulation.

🌑 The Dark Web & Three Webs

  • Surface web: publicly accessible pages.
  • Deep web: content behind logins or firewalls.
  • Dark web: accessible via specialized tools (e.g., Tor) for greater anonymity; businesses should block unauthorized access and monitor for leaked data.

🔗 Internet of Things (IoT) Basics

IoT is a network of physical objects with sensors, processors, and connectivity. Examples: wearables, smart homes, autonomous vehicles, and smart cities. IoT requires IP addressing and connectivity; benefits include cost reduction, deeper customer insight, improved service, and safety, while risks include sensor faults, incomplete data, and privacy/security concerns.

🖥️ Anatomy of a Computer — Core Hardware

Central Processing Unit (CPU) is the processor that executes instructions. Memory (RAM) stores data and instructions for fast access. Input/Output (I/O) devices enable interaction with the system (keyboards, displays, network adapters, storage).

⚙️ Hardware & Software Relationship

Hardware provides the physical resources; software (system and application) instructs hardware how to operate. A clear understanding of both layers helps diagnose performance, compatibility, and security issues.

🔋 Design Considerations

When evaluating hardware and software choices consider performance, scalability, response time, archiving, and security to ensure systems meet business needs and integrate with organizational processes.

🧭 Course & Week Overview (Introductory Notes)

This section summarizes typical introductory topics covered in Week #1/early course slides: purpose and scope of Information Systems (IS), the role of IS in organizations, and why understanding IS concepts (networks, databases, hardware/software, security, and ethics) matters for decision makers.

🎯 Core Concepts to Master Early

Focus on understanding how IS supports business processes, basic IS components (people, data, hardware, software, networks, procedures), and the importance of data quality, security, and governance. Early mastery of these foundations supports deeper study of cloud, databases, networks, and IoT.

✅ Study Strategies for Week 1 Topics

Start with clear definitions of core IS terms, map components to real-world examples (e.g., systems you use at work/school), and practice summarizing how an IS solves a specific business problem. Keep notes organized by topic to make later integration with networks, cloud, and databases easier.

Sign up to read the full notes

It's free — no credit card required

Already have an account?

Continue learning

Explore other study materials generated from the same source content. Each format reinforces your understanding of Comprehensive Study Notes — Principles of Information Systems (Selected Weeks) in a different way.

Create your own study notes

Turn your PDFs, lectures, and materials into summarized notes with AI. Study smarter, not harder.

Get Started Free
Comprehensive Study Notes — Principles of Information Systems (Selected Weeks) Study Notes | Cramberry