MIS 301 • McCombs School of Business • UT Austin
Precise, citation-backed definitions drawn from lecture slides and course readings. Use the filters and search to study by chapter.
A visual interface that allows users to interact with software through graphical elementsâicons, windows, drop-down menus, radio buttons, and check boxesârather than typed text commands at a command line. Before GUIs, every computer user had to know command-line syntax. GUIs enabled non-programmers to use computers, democratizing computing in the workplace and at home. Every modern OS (Windows, macOS, iOS, Android) exposes a GUI to end users.
đ Lecture Slides Ch.SW, p.8â9.
A set of instructions that tells hardware what to do. Software comes in many categories depending on its function (OS, DBMS, middleware, enterprise application, consumer application), who can change its source code (open source vs. closed source), where the code executes (locally vs. hosted/SaaS), and what kind of standards it uses (open vs. closed). Understanding these four dimensions is the starting framework for classifying any software a manager encounters.
đ Lecture Slides Ch.SW, p.2â4.
The core software layer that acts as the interface between hardware and all users and applications on a computing device. Core functions: process keystrokes and mouse movements, send display signals, read and write disk files, control application processing, set look and feel, and manage/schedule the computer's resources. Every computing device has oneâlaptops, smartphones, video game consoles, microwave ovens, and car dashboards. Business models: sell the OS (Microsoft Windows), bundle with hardware (Apple macOS/iOS), or distribute freely (Linux, Android).
đ Lecture Slides Ch.SW, p.11â14.
Software used for creating, maintaining, and manipulating data. A DBMS sits in the third layer of Konana's ecosystem (above the OS, below middleware). Most enterprise software operates in conjunction with a DBMS. A database application is a collection of forms, reports, queries, and application programs that process the underlying database. Multiple applications (order entry, purchasing, warehouse management) can share one database, eliminating data redundancy and improving quality. Major vendors: Oracle, Microsoft SQL Server, MySQL (open source), IBM DB2.
đ Lecture Slides Ch.SW, p.16â22.
Software that acts as "plumbing for data"âit sits between the DBMS and application layers in Konana's ecosystem, routing requests and enabling different applications and systems to communicate. In a web stack, a web server (e.g., Apache, Express.js, Node.js) is the middleware: it receives HTTP requests from the browser, coordinates with the DBMS, and delivers responses. In an enterprise context, middleware enables separate systemsâpatient records, billing, and lab resultsâto exchange data in real time without being rebuilt from scratch.
đ Lecture Slides Ch.SW, p.24â26.
Software that addresses the needs of multiple users across an entire organization. ERP (Enterprise Resource Planning) integrates HR, manufacturing, inventory, purchasing, and order tracking into one system sharing a single database. SCM (Supply Chain Management) software coordinates supplier relationships and reduces the bullwhip effect. CRM (Customer Relationship Management) tracks customers across the full lifecycle and all channels, helping identify high- and low-value segments. A single unified database across these applications drives value chain efficiency and can make firms more attractive acquisition targets.
đ Lecture Slides Ch.SW, p.27â32.
The accuracy, completeness, and consistency of data stored in an organization's systems. Poor data quality is surprisingly common and costly. NestlĂ© sells 100,000 products in 200 countries. Of its 9 million vendor/customer/materials records, roughly half were obsolete or duplicated, and one-third of the remainder were inaccurate or incompleteâa vendor name abbreviated in one record but spelled out in another caused double-counting. After a SAP ERP overhaul consolidating everything into one database, NestlĂ© saved $30 million per year on vanilla alone from its American operations.
đ Lecture Slides Ch.SW, p.33.
User applications are used on a personal device and typically support tasks performed by a single user (e.g., Excel, Google Chrome, Angry Birds). Enterprise applications address the needs of multiple users throughout an organization or work group (e.g., SAP ERP, Salesforce CRM). Enterprise applications work in conjunction with a shared DBMS so that all departments access the same data, unlike user applications which typically operate on local files.
đ Lecture Slides Ch.SW, p.34â35.
An empirical observation, first published by Gordon Moore (co-founder of Intel) in 1965, that the number of transistors on an integrated circuit roughly doubles approximately every 18â24 months, yielding exponential improvements in computing performance per dollar. It is not a physical law but became a business plan and expected pace of innovation for the semiconductor industry.
đ Moore, G.E. (1965). "Cramming more components onto integrated circuits." Electronics, 38(8). | Lecture Slides Ch.10, p.5.
A semiconductor device that acts as an electronic switch, representing binary data by toggling between two states: on (= 1) and off (= 0). Modern computer chips contain billions of transistors packed together to perform complex computations.
đ Gallaugher, J. (2023). Information Systems: A Manager's Guide to Harnessing Technology, Ch.6. | Lecture Slides Ch.10, p.10.
The fundamental unit of digital information, taking a value of either 0 or 1. The term "bit" is a portmanteau of "binary digit." Computers represent all dataâtext, images, video, codeâas sequences of bits. Data transfer speeds (internet, Wi-Fi) are measured in bits per second (bps, Mbps, Gbps). Note: lowercase "b" = bits; uppercase "B" = bytes.
đ Shannon, C.E. (1948). "A mathematical theory of communication." Bell System Technical Journal. | Lecture Slides Ch.10, p.19.
A byte = 8 bits â one keyboard character. Storage is measured in Bytes (capital B): 1 KB â 1,000 bytes (one typewritten page); 1 MB â 1 million bytes (one MP3 â 3 MB); 1 GB â 1 billion bytes (one DVD â 4.7 GB); 1 TB â 1 trillion bytes (Library of Congress â 20 TB); 1 PB â 1 quadrillion bytes; 1 EB â 1 sextillion bytes.
đ Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.12.
The primary processor that executes instructions in a computer. Using the "data kitchen" analogy: the CPU is the chef that runs the computer by following software (its recipes). The CPU uses main memory (RAM) as its active workspace and stores completed work or future-needed data in long-term storage.
đ Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.9.
An economic measure of how sensitively consumer demand responds to a change in price. Demand for computing technology is highly elasticâas prices fall, consumers find entirely new uses and demand far more. Example: storage prices fell from $399 for 5 GB (iPod, 2001) to free for 5 GB (iCloud, 2011), and total data storage consumed by consumers grew by orders of magnitude.
đ Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.6.
A microprocessor containing two or more independent calculating cores on a single piece of silicon. A group of multicore chips typically outperforms a single fast chip on parallel workloads (tasks that can run simultaneously), while running cooler and drawing less power. Multicore processors can also run legacy software written for single-core chips by using only one core at a time.
đ Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.16.
A GPU (Graphics Processing Unit) is a chip originally designed for rendering computer graphics, requiring the simultaneous execution of thousands of smaller calculations (high parallelism). This massively parallel architecture turned out to be ideal for AI/ML training. The general category for purpose-built chips optimized for specific tasks is Application-Specific Integrated Circuits (ASICs). Nvidia's GPUs are the dominant ASIC for AI workloads.
đ Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.16.
Discarded, often obsolete electronic devices and components. Global e-waste reached 62 million tons in 2022 and is projected to rise to 74 million tons by 2030. E-waste contains toxic substances (lead, cadmium, mercury) that contaminate soil and water if not processed properly. Informal recycling by burning is common in developing countries because it is often cheaper to ship e-waste abroad than to recycle it responsibly. The U.S. has no comprehensive federal e-waste recycling law.
đ Global E-waste Monitor 2024. | Gallaugher (2023), Ch.6. | Lecture Slides Ch.10, p.27â29.
An emerging computing paradigm that uses quantum bits (qubits) instead of classical binary bits. Unlike a bit (strictly 0 or 1), a qubit can represent 0, 1, or both simultaneously through quantum superposition. Potential applications include predicting the weather months in advance, hyperdetailed human body simulations, and unbreakable cryptographic systems. Quantum computing is not yet commercially feasible.
đ Preskill, J. (2018). "Quantum Computing in the NISQ Era and Beyond." Quantum, 2, 79. | Lecture Slides Ch.10, p.25.
A layered model of information technology infrastructure proposed by Prabhudev Konana (2007). From innermost to outermost: Hardware â Operating System â Database Management System â Middleware â Enterprise Applications â Consumer Applications. Because each layer depends on the layers beneath it, organizations face lock-in and switching costs when changing any layer, since changes cascade upward through the stack.
đ Konana, P. (2007). Cited in Gallaugher (2023), Ch.6 & Ch.9. | Lecture Slides Ch.10 p.8; Ch.15 p.8.
The financial, operational, and psychological expenses incurred when changing from one technology product, vendor, or system to another. In Konana's ecosystem model, switching costs arise because each software layer depends on layers beneath it. In SaaS, switching costs create vendor lock-in: if a SaaS provider fails or raises prices, customers may face expensive, time-consuming migration to an alternative platform.
đ Gallaugher (2023), Ch.6 & Ch.9. | Lecture Slides Ch.10 p.8; Ch.15 p.21.
The delay between initiating a request and receiving a response. In cloud and SaaS computing, latency refers specifically to the time added by the round trip a data request must make between a user's device and a remote server over the internet. High latency can significantly degrade the performance of real-time applications. Online gaming requires low latency (under 50 ms); streaming 4K video tolerates higher latency because video buffers ahead.
đ Gallaugher (2023), Ch.6 & Ch.9. | Lecture Slides Ch.10 p.18â20; Ch.15 p.21â25.
The maximum rate at which data can be transmitted over a network connection, measured in bits per second (Mbps or Gbps). ISPs advertise bandwidth in Megabits (Mbps); file sizes are in Megabytes (MB). Divide Mbps by 8 to get MB/s download speed. Bandwidth is analogous to highway lanes; latency is the speed limitâboth matter for network performance.
đ Gallaugher (2023), Ch.6 & Ch.9. | Lecture Slides Ch.10 p.19â20.
A software delivery model in which applications are hosted on a vendor's remote servers and accessed by users through a web browser over the internet, rather than installed locally. In SaaS, the vendor manages all infrastructure layers. Examples: Google Sheets, Salesforce CRM, Office 365, Canvas. Business model: typically monthly subscription or usage-based pricing.
đ Gallaugher (2023), Ch.9. | NIST SP 800-145 (2011). | Lecture Slides Ch.15, p.9, 13.
A cloud computing model in which a third-party provider owns and manages physical hardware (servers, storage, networking), while the customer manages the operating system, databases, middleware, and all applications running on that hardware. Example: Netflix and Walmart run their operations on Amazon Web Services (AWS)âthey manage their own software stack on Amazon's physical hardware.
đ Gallaugher (2023), Ch.9. | NIST SP 800-145. | Lecture Slides Ch.15, p.9.
A comprehensive accounting of all costs associated with acquiring and operating a technology system over its entire lifecycle. The purchase price represents only approximately 20% of TCO; the remaining ~80% consists of hidden costs including: requirements analysis and site prep, implementation and deployment, training, initial efficiency loss, ongoing operational support, maintenance, and strategic development to keep up with a changing competitive landscape.
đ Gallaugher (2023), Ch.9. | Gartner Research on IT TCO. | Lecture Slides Ch.15, p.17â18.
A pricing strategy in which a basic version of a product or service is offered at no cost to attract users, while advanced features, higher usage limits, or a premium version are available for a fee. Common among SaaS providers as a customer acquisition strategy. Examples: Spotify (free with ads vs. paid), Slack (free tier vs. paid plans), Dropbox (free storage vs. paid expansion).
đ Anderson, C. (2009). Free: The Future of a Radical Price. | Gallaugher (2023), Ch.9. | Lecture Slides Ch.15, p.13.
Open standards are publicly available technical specifications that allow any company to create compatible or interoperable software without requiring permission from the original developer (e.g., Microsoft Windowsâthird parties can build Windows-compatible software freely). Closed standards are controlled by the owning firm, requiring its explicit permission before third parties may develop complementary applications (e.g., Apple's iOS App Storeâdevelopers must comply with Apple's approval process).
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.15, p.4.
The unauthorized copying, distribution, or use of proprietary software in violation of its license agreement. SaaS dramatically reduces piracy risk compared to traditional installed software because the application runs on the vendor's server and is never installed on the user's deviceâthere is no executable file to copy or share illegally. Users must authenticate via the internet to access the service.
đ BSA. Global Software Survey. | Gallaugher (2023), Ch.9. | Lecture Slides Ch.15, p.14.
The human-readable set of instructions written by a programmer in a specific programming language (e.g., Python, Java, C++) that defines how software behaves. Source code must be either compiled (translated entirely into machine code before execution) or interpreted (translated line-by-line at runtime). Whether source code is publicly shared or kept secret is the defining difference between open source and closed source software.
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.9â10.
The Free Software Foundation (FSF), founded in 1983 by Richard Stallman, holds that restricting access to software source code is morally wrong. It created the GNU General Public License (GPL)âa "copyleft" license guaranteeing users the right to run, study, modify, and redistribute software. The GPL requires that any derivative work built on GPL-licensed code must itself be released under the GPL. It is the legal foundation that allowed open source infrastructure to spread freely.
đ Free Software Foundation. GNU General Public License v3. | Lecture Slides Ch.8 (OSS), p.15.
A free, open-source, Unix-like operating system kernel (the core of an OS that manages CPU, memory, and device I/O) created in 1991 by Linus Torvalds. Linux powers the majority of the global internet infrastructure, most cloud servers (including much of Microsoft Azure), and is the basis for Android (the world's most-used mobile OS). Its mascot is Tux the penguin.
đ Torvalds, L. (1991). Original Linux kernel announcement. | Linux Foundation. | Lecture Slides Ch.8 (OSS), p.14.
By the early 2000s, the global internet ran on Linux maintained by a small group of unpaid volunteersâa dangerous "bus factor" (if key maintainers were hit by a bus, development would collapse). Rivals also feared fragmentation reminiscent of the "Unix Wars" (1980sâ90s). To address both risks, IBM, HP, Intel, and Oracle formed the Linux Foundation (2007)âa neutral industry trade association that funds core maintainers, standardizes the code, and legally protects the Linux trademark.
đ The Linux Foundation. linuxfoundation.org. | Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.16â17.
A coordinated set of layered software technologies that work together to make a website or application function. Each layer in the stack handles a different concernâthe OS manages hardware resources, the database handles data persistence, the web server (middleware) routes requests, and the programming language/framework builds the user-facing application. Stacks are how Konana's ecosystem model maps to real-world products. Developers interact between layers via APIs (Application Programming Interfaces).
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.21.
The original open-source web application stack, still powering 40%+ of websites. The acronym stands for: Linux (OS), Apache (web server / middleware), MySQL (relational database), PHP/Python/Perl (programming languages). In Konana's ecosystem: Linux = OS layer; MySQL = DBMS layer; Apache = Middleware layer; PHP/Python = Application layer. Powers Facebook (originally), Wikipedia, YouTube (originally), and Slack.
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.23 & p.25.
A modern open-source web stack using JavaScript across all layers: MongoDB (NoSQL/document database), Express.js (web server framework / middleware), Angular (front-end JavaScript framework), Node.js (server-side JavaScript runtime). Key advantages over LAMP: (1) all layers use a single language (JavaScript), making it easier to hire "full-stack" developers; (2) MongoDB's flexible document model is better for highly dynamic real-time applications (e.g., Netflix, Uber) where data structures change frequently.
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.24 & p.26.
Open source software vendors do not sell source code (it is free). Instead they monetize surrounding services. The four main revenue streams are: (1) Support & Stabilityâenterprises pay for guaranteed professional support; (2) Security & Complianceâselling certified, hardened versions for regulated industries; (3) Premium Tools for Scale ("The Anaconda Model")âselling enterprise-grade management tools on top of the free software; (4) Hosted Managed Servicesârunning the software for customers in the cloud.
đ Gallaugher (2023), Ch.8. | Lecture Slides Ch.8 (OSS), p.12 & p.30.
A foundational project management model stating that every project is governed by three interdependent driversâScope (requirements/features), Resources (money, people, equipment), and Schedule (time)âand that adjusting any one dimension requires a trade-off against the other two. Example: adding scope without increasing resources will extend the schedule; compressing the schedule without reducing scope requires more resources.
đ Gallaugher (2023), Ch.11. | PMI PMBOK Guide. | Lecture Slides Ch.17, p.4.
Brook's Law (from Fred Brooks' 1975 book The Mythical Man-Month): "Adding manpower to a late software project makes it later." New team members require onboarding time, existing members must mentor them, and communication overhead grows non-linearly with team size. This is called diseconomies of scale: as development teams grow, average contribution per worker decreasesâthe opposite of economies of scale.
đ Brooks, F. (1975). The Mythical Man-Month. | Gallaugher (2023), Ch.11. | Lecture Slides Ch.17, p.3.
A relatively linear, sequential approach to software development in which each phase (requirements â design â development â testing â deployment) must be completed and approved before the next begins. Benefits include surfacing all requirements up front and creating a clear blueprint. Drawbacks: very rigid, slow to implement, requires precisely known requirements from the start, and cannot easily accommodate changes mid-project. Works for civil engineering; rarely works for software.
đ Royce, W.W. (1970). Original waterfall model paper. | Gallaugher (2023), Ch.11. | Lecture Slides Ch.17, p.11.
The dominant modern software development methodology. Agile develops work continually and iteratively, breaking larger projects into smaller components delivered in short cycles (sprints). Goal: more frequent product rollouts and constant improvement. The cyclic process: Plan â Design â Develop â Test â Deploy â Review â (repeat). Popular due to speed and flexibility. "Agile sounds chaotic, but products actually ship."
đ Beck, K. et al. (2001). Manifesto for Agile Software Development. | Gallaugher (2023), Ch.11. | Lecture Slides Ch.17, p.12â13.
The gradual, often uncontrolled expansion of a project's requirements during development, beyond what was originally agreed upon. Each individual addition may seem small, but cumulative scope creep is one of the leading causes of technology project failureâdirectly driving budget overruns, schedule delays, and team burnout. Listed explicitly in the slides as a primary failure mode, alongside poor goal setting, weak leadership, inadequate resources, and poor communication.
đ Gallaugher (2023), Ch.11. | Lecture Slides Ch.17, p.19.
Highly visual software development tools that allow usersâcalled citizen developersâto create information systems with little or no traditional coding. The LCNC market was ~$27 billion in 2023, growing 20% year-over-year. Major providers: Google (AppSheet), Microsoft (Power Apps), Oracle (APEX), Salesforce. Risks of poorly governed LCNC deployments include: inconsistent/duplicate data, regulatory violations (HIPAA/FERPA/GDPR), vendor abandonment, and security vulnerabilities.
đ Gallaugher (2023), Ch.11. | Gartner Low-Code Market Report (2023). | Lecture Slides Ch.17, p.17â18.
5 scenario-based questions covering Konana's ecosystem, operating systems, DBMSs, middleware, enterprise applications, and data quality.
Chapter Score
5 scenario-based questions targeting application and analysis. Select the best answer to check your understanding.
Chapter Score
5 scenario-based questions targeting application and analysis. Select the best answer to check your understanding.
Chapter Score
5 scenario-based questions targeting application and analysis. Select the best answer to check your understanding.
Chapter Score
5 scenario-based questions targeting application and analysis. Select the best answer to check your understanding.
Chapter Score