• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Posts

Functions in JavaScript. 5B

Leonid Kovalchuk - March 1, 2023 Leave a Comment

A function in JavaScript is a reusable block of code that performs a specific task. All functions have a name, arguments, and a code block.

Calling a function executes the code contained within the function. This means the code inside the function will be run and any return values will be outputted when the function is finished running.

Passing a function argument refers to supplying a function with the data it needs to execute. This data is typically supplied in the form of values that are passed as parameters to the function. By passing arguments to a function, the function can be more versatile and dynamic as it can take different data values each time it is called.

The return keyword is used to return a value or data from a function. It can be used to explicitly return a value to the caller of the function, or to end the execution of the function and return control to the caller of the function. Additionally, it allows you to immediately terminate the function execution and provide a value or data to the caller.

Variables in JavaScript. 5A

Leonid Kovalchuk - March 1, 2023 Leave a Comment

A variable in JavaScript is a named storage unit that can be used to store data like strings, numbers, boolean values, objects, arrays, and more. Variables are created with the keyword var followed by the name of the variable and an optional value (which can be changed later). For example:

var myName = “John”;

To initialize a variable in most programming languages, you must first declare the variable and then assign it a value. For example, in JavaScript, you could declare an integer variable called “myNum” and assign it the value of 10:

var myNum = 10;

  1. Variable names must begin with a letter, $, or _.
  2. Variable names cannot contain spaces or special characters such as !, @, #, %, etc.
  3. Variable names cannot contain reserved keywords such as if, else, while, switch, etc.
  4. Variable names should be descriptive and must be easy to read.
  5. Variable names are case sensitive in most languages.

The arithmetic operators in JavaScript are:

Addition (+) – The addition operator adds two values together.

Subtraction (-) – The subtraction operator subtracts two values.

Multiplication (*) – The multiplication operator multiplies two values together.

Division (/) – The division operator divides two values.

Exponentiation (**) – The exponentiation operator raises a number to a power.

Modulus (%) – The modulus operator returns the remainder of an integer division.

Increment (++) – The increment operator increases an integer value by one.

The line of code used to prompt a user for a response is: prompt(“Please enter a response”);

Threat modeling and Cybersecurity. 4B

Leonid Kovalchuk - March 1, 2023 1 Comment

Threat modeling is the process of defining and analyzing assets, identifying potential threats and assessing the likelihood that these threats could exploit those assets. It requires a comprehensive understanding of the system, its components, architecture, available security controls, and other security considerations. The goal of threat modeling is to identify and prioritize areas of risk that need to be addressed by security controls.

Regulations involved with data protection and cybersecurity:

  1. The General Data Protection Regulation (GDPR)
  2. The Data Protection Act
  3. The California Consumer Privacy Act (CCPA)
  4. Health Insurance Portability and Accountability Act (HIPAA)
  5. Payment Card Industry Data Security Standard (PCI DSS)

Ransomware is a type of computer malware that restricts access to the victim’s data by encrypting it and demands a ransom payment in order to decrypt and regain access. Hospitals are often targeted because medical records and other personal data are highly valuable on the black market. Hospitals also have a greater incentive to pay the extortion fee since the alternative could potentially be a disruption of critical medical services.

  1. Use strong passwords and two-factor authentication: Choose passwords that are at least 8 characters long and include a combination of numbers, symbols, and upper- and lower-case letters. Consider using two-factor authentication to add an extra layer of security to your accounts.
  2. Keep your operating system and security software up to date: Regularly update your operating system and security software to protect against the latest threats.

Alan Turing was a British mathematician, computer scientist, and theoretical biologist. He is credited as being the father of modern computer science and artificial intelligence. The Turing Test is a test used to determine whether or not a computer is able to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. It was developed by Turing in 1950, and it works by having a human judge interact with two parties at the same time – one being a human and the other being a computer. The judge must determine which is which based solely on their conversation with the two.

Pros of using digital platforms. 4A

Leonid Kovalchuk - March 1, 2023 Leave a Comment

A network effect is a phenomenon wherein the value or utility of an item increases as the number of its users grows. It is an example of positive feedback and a key factor of success for many products and services. Examples of network effects include networked telephones, social networks, and online marketplaces.

Pros:

  1. Flexibility and scalability: Clouds can be easily scaled up or down based on the changing computing needs of businesses.
  2. Cost Savings: Rather than investing in hardware and software, businesses can rent and pay for cloud computing services as they go.
  3. Reliability: Cloud computing services are usually provided by a large number of geographically distributed data centers that offer high availability.
  4. Security: Cloud computing providers offer enhanced security for their users’ data and applications, with regular data backups, anti-malware software, and encryption protocols.

SaaS (Software as a Service) is a way of delivering applications over the internet, usually on a subscription basis. This type of service eliminates the need for users to install and maintain application software and also provides access to applications over the internet.

PaaS (Platform as a Service) provides a platform as a service to software developers, allowing them to develop, run, and manage applications without the complexity of building and maintaining the infrastructure. This type of service provides developers with access to servers, storage, networking, and hosting technology.

IaaS (Infrastructure-as-a-Service) is a type of cloud computing that provides virtualized computing resources over the internet. With IaaS, businesses rent virtual server space, storage and networking capacity from a cloud service provider. The provider hosts and maintains the hardware, while businesses access the resources, they need using a web-based interface.

Product managers are responsible for the product development cycle from concept to completion. They are responsible for developing a product’s vision, providing direction to the teams that drive product development, and driving the product to success. Product managers research, analyze and define the product’s requirements, provide feedback to engineers and designers, lead the product’s launch, and monitor the product’s performance in order to drive further development. Product managers must be able to think strategically, understand customer needs and effectively lead cross-functional teams.

What separates data from big data? 3B

Leonid Kovalchuk - March 1, 2023 1 Comment

Descriptive analytics is a type of analytics that uses historical data and summarizing it into meaningful patterns, such as the analysis of customers’ purchasing histories. Descriptive analytics provide the “what has happened” information.

Predictive analytics is a type of analytics that looks at historical data, identifies patterns and trends, and then uses them to predict future events and outcomes. Predictive analytics can help organizations make better decisions and anticipate needs and future demands.

Data is typically defined as information that is stored and organized in a structured manner that can be easily analyzed. Big data, on the other hand, is large, complex collections of data that typically contain many different types of data sources and formats. Big data can include a wide variety of data types such as images, audio, video, and text. Big data can also come from sources such as social media, mobile devices, financial transactions, and sensors. Big data can often contain more than Terabytes of data and must often be analyzed using different techniques such as machine learning.

Companies use big data to gain insights on customer behavior, market trends, and operational efficiency. By analyzing large sets of data, businesses can better understand their current market and customer needs, as well as anticipate future customer behavior. This can help companies make more informed decisions, predict future customer needs, and ultimately improve operational efficiency. This can be especially useful in industries such as e-commerce, where data-driven decisions can help a company reduce costs and boost profits.

Radio Frequency Identification (RFID) is a type of automated data capture technology that utilizes radio waves for communication between a tag consisting of an antenna, a transceiver and a processor, and a reader. The transponder embedded in the tag contains a unique identification code that is read by the reader, which in turn allows the reader to identify, locate and track objects in a supply chain. RFID tags can be affixed to goods, assets and personnel to ensure tracking, authentication, control and visibility throughout the supply chain.

Purpose of ERP. 3A

Leonid Kovalchuk - March 1, 2023 1 Comment

ERP stands for Enterprise Resource Planning. It is a business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back-office functions related to technology, services, and human resources. ERP systems track business resources—cash, raw materials, production capacity—and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system share data across various departments (manufacturing, purchasing, sales, accounting, etc.) that provide the data.
ERP (Enterprise Resource Planning) is an integrated system used to manage an organization’s resources, including product planning, sales, development, procurement, inventory, and accounting. Its purpose is to streamline and automate the various components of a business to improve efficiency, accuracy, and productivity. ERP also helps businesses make better decisions with its powerful analytics, insights, and reporting capabilities.
1. Lack of Security – Many legacy systems feature outdated security protocols, leaving them vulnerable to attack.
2. Limited Support – Older technologies are being phased out, leaving companies with few options for technical assistance.
3. Expensive Upgrades – Regularly upgrading older systems to support new technologies and standards can be a costly endeavor.
4. Outdated Technology – Legacy systems may not be able to keep up with modern computing requirements and may be at risk of becoming obsolete.
5. Poor Interoperability – It’s often difficult to integrate new technologies into a legacy system due to compatibility.
The purpose of a Customer Relationship Management (CRM) system is to help businesses manage customer information and interactions efficiently. CRM systems can streamline communication, store customer data in one central location, keep track of leads, increase sales and improve customer service. CRM systems provide analytics and information to enhance decision-making, spot trends, and help businesses increase efficiency, customer satisfaction, and profitability.
CRMs are used by businesses to organize and manage customer and lead data, including contact information, purchase history, and interactions. Because of their ability to automate processes, CRMs are also used for lead nurturing, marketing automation, sales forecasting, upselling, customer support and loyalty programs.

Digital Identity. 2B

Leonid Kovalchuk - March 1, 2023 2 Comments

Your digital identity is the image you present to the world on the internet. It is the combination of your online activities and the information you create and share, such as blog posts, videos, photos, social media profiles, and other digital materials. You can manage your digital identity by producing and curating quality content, as well as deciding who you want to be online and understanding how that presents itself in your content. You should also be aware of how you can protect your data and privacy by adjusting the settings on your social media accounts. Additionally, always be mindful of your language and behavior while online.
A good digital identity is important because it is the reputation that you build online, and it reflects who you are. Your digital identity shapes the way people perceive you and determines the level of trust and respect that you will have in the online world. With an appropriate and positive digital identity, people can identify you, interact with you, and even do business with you in a secure environment. It also serves as an important factor in professional success as employers can use digital footprints to research potential candidates and make informed hiring decisions. Finally, it can help you build a positive online presence, establish credibility, and foster relationships with your peers.
The MIS community platform is a virtual platform designed to support, engage, and connect members of the Management Information Systems (MIS) community throughout the world. The platform offers the ability to ask questions, start conversations, access resources, and build relationships with members of the MIS community. The platform also provides access to a library of research, guides, and articles, as well as a selection of job postings.

The different relationships in crow’s foot. 2A

Leonid Kovalchuk - March 1, 2023 Leave a Comment

An Entity Relationship Diagram (ERD) is a graphical representation of a database system that illustrates the relationships between entities or concepts within that system. It typically shows the components of the system and the relationships among different parts of the system, such as entities, attributes, relationships, and constraints. ERDs can be used to design a database or to analyze and improve an existing one.
The two notations for ERD’s are Chen’s notation and Crow’s Foot notation.
The primary symbols in literature refer to an object, image, word, or action that has its own meaning and can be used to represent an abstract idea. Examples of primary symbols include a rose for love, a dove for peace, a book for knowledge, and a cross for faith.
The different relationships in crow’s foot notation are one-to-one (1:1), one-to-many (1:N), and many-to-many (N:N).
The 1:1 relationship is indicated by a single line connecting two entities, while the 1:N relationship is indicated by a line connecting one entity to another with an arrowhead at the end of the line pointing to the entity on the other side. The N:N relationship is indicated by two lines with a crow’s foot at the junction of the two lines, indicating that many instances of one entity.
Salesforce is a cloud-based customer relationship management (CRM) platform developed by Salesforce. It provides businesses with a suite of applications designed to help them manage customer relationships, maintain and track customer data, and integrate with other business systems. It also provides tools to help with marketing automation, customer service, analytics, and application building.
1. One-one (1:1) cardinality: This type of cardinality is the most basic relationship, representing a single record in one table that corresponds to a single record in another table. This relationship is typically utilized to build associations between two tables by establishing a primary/foreign key relationship.

2. One-many (1:N) cardinality: This type of cardinality is used to create relationships between two tables, where one table has multiple related records in the second table. This relationship is typically used in more complicated database structures, and one table will contain a foreign key field which will link it

Why use Saleforce? 1B

Leonid Kovalchuk - March 1, 2023 Leave a Comment

Salesforce services allow businesses to use cloud technology to better connect with partners, customers, and potential customers. Using the Salesforce CRM, companies can track customer activity, market to customers, and many more services.
Circles in a swim lane diagram represent the beginning or end of an event, and rectangles represent activities in the process. Diamonds represent decisions that must be made. Arrow: Flow
Cylinder: Stored Data.
A process map is a planning and management tool that visually describes the flow of work. Using process mapping software, process maps show a series of events that produce a result.
Swim lane (cross functional) diagrams provide a mechanism to easily indicate the department, function, or party responsible for the activities that make up a business process.

What is MIS? 1A

Leonid Kovalchuk - March 1, 2023 Leave a Comment

Waterfall is a Linear Sequential Life Cycle Model, whereas Agile is a continuous iteration of development and testing in the software development process. In Agile vs Waterfall difference, the Agile methodology is known for its flexibility, whereas Waterfall is a structured software development methodology.
A management information system (MIS) is a set of systems and procedures that gather data from a range of sources, compile it and present it in a readable format.
The UX design process can be divided into four key phases: user research, design, testing, and implementation. While the UX design process does typically take place in that order, it is important to note that UX is an iterative process.
SDLC – Software Development Life Cycle
API – Application Program Interface
ERP – Enterprise Resource Planning
UX – User Experience
The core of all systems is collectively referred to as the CPU
MIS professionals create information systems for data management. In addition, they manage various information systems to meet the needs of managers, staff and customers

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Interim pages omitted …
  • Page 41
  • Go to Next Page »

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University