2205 info hw 2
core ERP components or extended ERP components: human resources
Core ERP
under what policy might an employee be fired for attempting to break into other employees computers
acceptable use policy
Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.
accounting and finance ERP component
sales projections for bike sales for the next 12 months is an example of ____ data
analytical
What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers?
analytical CRM
highlighting all customers who have purchased a service in over a year and sending a personal letter and a special discount coupon is an example of...
analytical CRM
what type of data is quarterly sales forecast, industry growth perspective, and market trend analysis?
analytical data
attribute or entity: customer name, distributor ID, product price
attributes
fingerprint or voice encryption, user id and token and smartcard are all examples of
authentication and authorization
what type of hacker breaks into other peoples computer systems and may just look around or may steal and destroy info
black hat hacker
a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs
bug bounty program
creating an iphone application and securing legal protection so others cannot sell your application
copyright
core ERP components or extended ERP components: accounting and finance
core erp
core ERP components or extended ERP components: production and materials management
core erp
The traditional components included in most ERP systems and primarily focus on internal operations
core erp component
creating a fake version of microsoft office and selling it to other people
counterfeit software
what type of hacker has criminal intent when hacking
cracker
What are the 4 types of attributes you might find in the Electra Bike Customer/Sales database management system?
customer ID, order number, order amount, order date
What are the 4 types of entities you might find in the Electra Customer/Sales database management system?
customer, order, shipping, payment
what type of hacker seeks to cause harm to people or to destroy critical systems or info and use internet as a weapon
cyberterrorist
a process that weeds out and fixes inconsistent, incorrect, or incomplete data
data cleansing
The smallest or basic unit of information.
data element
master data management and data validation fall under the data category of
data governance
the overall management of the availability, usability, integrity, and security of company data is known as
data governance
What is a storage repository that holds a vast amount of raw data in its original format until the business needs it?
data lake
a storage repository that holds a vast amount of raw data in its original format until the business needs it
data lake
contains a subset of data warehouse data
data mart
Logical data structures that detail the relationships among data elements using graphics or pictures.
data model
What occurs if there are duplicate data in a data file?
data not unique
content filtering, antivirus software, and firewall are all examples of _____ _____ and ______
data prevention and resistance
data inconsistency, data integrity issues, and data steward fall under the data category of
data quality
a process of extracting large amounts of data from a website and saving it to a spreadsheet or computer is know as:
data scraping
real time data and real time systems fall under the data category of
data timeliness
transactional data and analytical data fall under the data category of
data type
Creates, reads, updates, and deletes data in a database while controlling access and security is a ______ ______ system
database management system
intrusion detection software is an example of _____ and _____ of ____
detection and response of attacks
erroneous or flawed data
dirty data
looking through peoples trash is another way hackers obtain information
dumpster diving
under what policy might an employee be fired for sending spam to other employees
email privacy policy
Stores information about a person, place, thing, transaction, or event
entity
attribute or entity: customer, distributor, product
entity
under what policy would someone be fired for spending a significant amount of time playing computer games at work _____ _____ _____ policy
ethical computer use policy
What are the principles and standards that guide our behavior toward other people?
ethics
core ERP components or extended ERP components: business intelligence
extended ERP
core ERP components or extended ERP components: customer relationship management
extended ERP
core ERP components or extended ERP components: ebusiness
extended ERP
core ERP components or extended ERP components: supply chain management
extended ERP
The extra components that meet organizational needs not covered by the core components and primarily focus on external operations
extended erp component
a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
extraction, transformation, and loading (ETL)
a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy is ______ ______ practices
fair information practices
sharing a video in a lecture to demonstrate a course concept is protected by ___ ___ doctrine
fair use doctrine
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
foreign key
a legal framework that sets guidelines for the collection and processing of personal information of individuals within the european union
general data protection regulation
what type of hacker has philosophical and political reasons for breaking into systems as protests
hacktivist
the common term for the representation of multidimensional data
information cube
Which of the following is a method or system of government for information management or control?
information governace
Which of the following epolicies would be most important to Warby Parker's customers?
information privacy policy
____ contains general principles regarding information privacy
information privacy policy
under what policy : a company posts its employees social security numbers on its website
information privacy policy
details how an organization will implement the information security policies
information security plan
identify the rules to maintain information security, such as requiring users to change password every 30 days
information security policies
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
insiders
writing a song and posting it to youtube is an example of ___ ___
intellectual property
How would Warby Parker categorize the large competitor that bought up many smaller eyewear brands enabling it to set the price for glasses throughout the industry?
legal and unethical
Warby Parker considered the business strategy of creating a profitable company with the goal of selling it to the large competitor as ________ and _________
legal and unethical
software that is intended to damage or disable computers and computer systems
malware
supports traditional processioning, supports operations that deal with customers, and supports day to day front offices is an example of
operational CRM
using campaign management systems to guide users through marketing campaigns is an example of ______ CRM
operational CRM
What is the primary problem associated with the enormous volume of organizational data?
organization becomes data rich but information poor (DRIP)
What term best describes the business component that Warby Parker designs its own eyeglass frames?
patent
copying microsoft office and distributing it for free is an example of
pirated software
Field (or group of fields) that uniquely identifies a given record in a table.
primary key
Handles production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control.
production and materials management ERP
a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software
scareware
what type of hacker finds hacking code on the internet and click and point their way into systems to cause damage or spread viruses
script kiddie
hackers use their social skills to trick people into revealing access credentials or other valuable information
social engineering
under what policy might an employee be fired for inappropriate company remark on his facebook page
social media privacy policy
which represents the most costly and intrusive form of authentication?
something that is part of the user, such as fingerprint or voice signature
Asks users to write lines of code to answer questions against a database is ______ ______ _______
structured query language (SQL)
What are the 4 types of attributes you might find in the Electra Bike Manufacturing/Production database management system?
supplier ID, supplier address, supplier phone number, supplier name
What are the 4 types of entities you might find in the Electra Bike Manufacturing/Production database management system?
supplier, inventory, materials, distribution
packing slip for shipping three bikes to a new customer is an example of ____ data
transactional data
what type of data is hotel reservation, shipping invoice, and restaurant receipt
transactional data
what type of hacker works at the request of the system owners to find system vulnerabilities and plug the holes
white hack hacker
under what policy might an employee be fired for visiting elicit websites on his work compute
workplace monitoring policy