IS 240 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

drive-by hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Client

A computer that is designed to request information from a server

data warehouse

A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks

Internet Corporation for Assigned Names and Numbers (ICANN)

A nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, and domain name system management.

change analyst

A person who is not afraid of change but makes changes only when there is a compelling reason to do so.

Vishing

A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

Typosquatting

A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

sniffer

A program that hackers use to capture IDs and passwords on a network.

waterfall methodology

A sequence of phases in which the output of each phase becomes the input for the next

Protocol

A standard that specifies the format of data as well as the rules to be followed during transmission.

viral marketing

A technique that induces websites or users to pass on a marketing message

heat map

A two-dimensional graphical representation of data that uses different shades of color to indicate magnitude

spyware

A type of Malware that locates and saves data from users without them knowing about it.

Graphical User Interface (GUI)

A user interface which displays images and pictures that allows a computer user to interact with a computer easily.

mobile application management (MAM)

Administers and delivers applications to corporate and personal smartphones and tablets.

agile methodology

Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements

integration

Allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems

optimization

An extension of goal seeking in which the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies.

Project manager

An individual who is an expert in project planning and management

Building software applications

An internal wiki is a great tool for a company, and is a useful tool for all of the following except

Analysis of project risks

An organization must identify what project it wants to do and how it is going to do it. What does the "how" part of this question focus on?

Velocity

Analysis of streaming data as it travels around the Internet

All of these (chapter 13 and 14 quiz)

At a local marketing firm, Sofia is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Sofia must have to be able to perform her job?

A banner ad

Bethany Jones is a real estate agent who specializes in the luxury home market in the Orlando, FL, area. Bethany is highly technical and uses many types of online marketing techniques to increase business. One of most successful online marketing techniques is to place a rectangular graphic display along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bethany using?

Banner ad

Box running across a web page that contains advertisements

Online Transaction Processing (OLTP)

Capturing of transaction and event information using technology to process, store, and update

source documents

Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.

Rapid Application Development (RAD)

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process

operational level

Employees develop, control, and maintain core business activities required to run the day-to-day operations

Telecommunications system

Enables the transmission of data over public or private networks

analytical information

Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks

supply chain execution systems

Ensure supply chain cohesion by automating the different activities of the supply chain

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

accurate, complete, consistent, timely, unique

Five Common Characteristics of High-Quality Information

Ensuring consumer protection

Hannah teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of the four ebusiness challenges which of the following is the most crucial challenge to consider before engaging in social media?

30 days

How many days is a typical sprint in the scrum methodology?

understand customer credit card usage and nonpayment rates

How would the banking industry use business intelligence?

Spatial data

Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more

RUP Gates

Inception, Elaboration, Construction, Transition

Ebusiness

Includes eCommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners and exchanging real-time information

Business intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

Core drivers of the information age

Knowledge Business Intelligence Information

Online Analytical Processing (OLAP)

Manipulation of information to create business intelligence in support of strategic decision making

Universal resource locator (URL)

Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?

Metrics

Measurements that evaluate results to determine whether a project is meeting its goals

Political feasibility

Measures how well the solution will be accepted in a given organization.

Decision support system

Models information to support managers and business professionals during the decision-making process

open system

Nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate.

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person

3

On average, how many years longer does each generation live than the previous in the United States?

Decision Making Process

Problem identification Data collection Solution generation Solution test Solution selection Solution implementation

Procurement

Purchases inputs such as raw materials, resources, equipment, and supplies

Bluetooth

Refers to a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

Chief Privacy Officer (CPO)

Responsible for ensuring the ethical and legal use of information

Chief Technology Officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT

GPS

Satellite-based system for determining the absolute location of places or geographic features.

cookie

Small text file that a Web server stores on a computer.

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

Supply chain

Supplier > Manufacturer > Distributor > Retailer > Customer Information flows > Payment flows <

backward integration

Taking information entered into a given system and sending it automatically to all upstream systems and processes

ISP

The Internet service provider is a company that provides access to the Internet for a monthly fee.

802.11

The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as ________, for carrying out wireless local area network communication.

process

The computer program that processes the data

Supply Chain Management (SCM)

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability

Systems Development Life Cycle (SDLC)

The overall process for developing information systems from planning and analysis through implementation and maintenance

data element (or data field)

The smallest or basic unit of information

Collaborative engineering

What allows an organization to reduce the cost and time required during the design process of a product?

text analytics

What analyzes unstructured data to find trends and patterns in words and sentences?

Factors that are considered to be true, real, or certain without proof or demonstration.

What are project assumptions?

plan, source, make, deliver, return

What are the 5 basic supply chain activities?

EProcurement and elogistics

What are the primary features of ebusiness components?

project objectives

What are the quantifiable criteria that must be met for the project to b considered a success?

reporting, analyzing, predicting

What are the three phases of CRM?

infographics

What can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?

CASE

What do software engineers use as tools to provide automated support for the development of the system?

Application Programming Interface (API)

What does API stand for?

In-sourcing

What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems?

RFID Accelerometer

What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?

data map

What is a technique for establishing a match, or balance, between the source data and the target data warehouse?

Machine Learning

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn and processes?

Machine Learning

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn?

Snapshot

What is a view of data at a particular moment in time?

Mashup

What is a website or web application that uses content from more than one source to create a completely new product or service?

Personal area network

What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user?

outsourcing

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Database

What is at the heart of any ERP system?

Enables users to get details, and details of details, of information

What is drill-down capability?

Data rich, information poor

What is it called when a manager has too much data and information to make a decision?

The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.

What is loose coupling?

Applies technology to the activities in the order life cycle from inquiry to sale

What is selling chain management?

Measures the practicality of a technical solution and the availability of technical resources and expertise.

What is technical feasibility?

Click fraud

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

Fast data

What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?

Deep web

What is the large part of the Internet that is inaccessible to conventional search engines?

Communication

What is the most important part of the project plan?

real-time adaptive security

What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?

Connecting people by matching profile information

What is the primary way that social networks work?

Data mining

What is the process of analyzing data to extract information not offered by the raw data alone?

Cartography

What is the science and art of making an illustrated map or chart? GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and map

Bus Width

What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?

Cluster analysis

What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?

identity management

What is the term for a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?

Wire media

What is transmission material manufactured so that signals will be confined to a narrow path and will behave predictably?

Knowledge-dependent global society

What kind of society is being created by the growth in information industries?

Hypertext markup language

What links documents, allowing users to move from one to another simply by clicking on a hot spot or link?

Weak AI

What machines can still make their own decisions based on reasoning and past sets of data?

operational feasibility

What measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities?

Economic feasibility

What measures the cost-effectiveness of a project?

Packet-switching

What occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer?

ALU

What performs all arithmetic operations (for example, addition and subtraction) and all logic operations?

Twisted-pair cable

What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?

Opt out

What refers to denying permissions to incoming emails?

Project milestones

What represents key dates by which a certain group of activities must be performed?

Network operating system

What runs a network, steering information between computers and managing security and users?

Crowdfunding

What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?

Wide area network

What spans a large geographic area, such as a state, province, or country?

upstream

Where would you find the suppliers' supplier in a typical supply chain?

CRM

Which application's primary business benefits include sales forecasts, sales strategies, and marketing campaigns?

Detailed internal reports

Which internal reports present information with little or no filtering or restrictions of the data?

Facebook

Which of the below is not an ISP? Comcast Netzero Facebook Earthlink

Downtime monitoring policy

Which of the below is not one of the six policies that a company should implement for information protection as discussed in the text?

Core competencies, market leaders, cost advantages, excellent management.

Which of the following are included as potential internal strengths in a SWOT analysis that are helpful to an organization?

Static text-based information websites.

Which of the following best describes Web 1.0?

Based on the "intelligent" web where applications use natural language processing.

Which of the following best describes Web 3.0?

A nonrepudiation clause

Which of the following clauses is typically contained in an acceptable use policy?

All of the above

Which of the following describes agile methodology? Fast and efficient Fewer Features all of the above lower cost

Uses GPS tracking to track vehicles

Which of the following describes automatic vehicle location (AVL)?

Collaboration system

Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

All of these

Which of the following is an extended ERP component? Customer relationship management All of these Business intelligence Ebusiness

Star

Which of the following is not a network topology? Bus Star Ethernet Ring

The cost of health care will decrease

Which of the following is not a potential business impact from people in developed countries living longer?

sears

Which of the following is not included in the top five companies that are expecting future growth to be generated from new investments?

Sustaining technology

Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

All of these

Which of the following questions can materials management help a company answer? What items are running low in the warehouse? What items are at risk of spoiling in the warehouse? What are our current inventory levels? All of these.

All devices are connected to a central cable or backbone

Which of the following represents the bus topology?

All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.

Which of the following represents the ring topology?

Opportunities and threats originate outside an organization.

Which of the following statements is correct when considering a SWOT analysis?

Marketing, sales, and accounting departments decide to use the same vendor for a new system.

Which of the following will help an organization maintain consistent business operations?

Walmart

Which of the following would not be considered a company operating in the long tail of a typical sales curve Zippos itunes netflix walmart

social media policy

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

viral marketing

Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?

project stakeholders

Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion?

Accounting, finance, logistics, and production

Who are the primary users of ERP systems?

Customers, resellers, partners, suppliers, and distributors

Who are the primary users of SCM systems?

executive sponsor

Who is the person or group who provides the financial resources for the project?

software customization

Within software customization, what is key for business process support that spans functional areas and legacy systems?

Data Broker

a business that collects personal information about consumers and sells that information to other organizations

Click-and-Mortar Business

a business that operates in a physical store and on the internet

Brick-and-Mortar Business

a business that operates in a physical store without an internet presence

Pure-play business

a business that operates on the internet only without a physical store

makerspaces

a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable

Click through

a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser

click through

a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser

maker movement

a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things

variable

a data characteristic that stands for a value that changes or varies over time

uplift modeling

a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

fuzzy logic

a mathematical method of handling imprecise or subjective information

information integrity

a measure of the quality of information

COBIT

a set of standard practices that are often used in the assessment stage of the BPM cycle

virus

a software written with malicious intent to cause annoyance or damage

Sensitivity Analysis

a special case of what-if analysis, is the study of the impact on other variables when one variable is changed repeatedly

Electronic Data interchange

a standard format for the electronic exchange of information between supply chain participants

Algorithm

a step-by-step procedure for solving a problem

Data lake

a storage repository that holds a vast amount of raw data in its original format until the business needs it

Search Engine Optimization (SEO)

a systematic process of ensuring that your firm comes up at or near the top of lists of typical search phrases related to your business

spoofing

a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

cluster analysis

a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible

Digital Rights Management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

Web-based self service systems

allow customers to use the web to find answers to their questions or solutions to their problems

Associate program

allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website

video conference

allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards

neural network

also called an artificial neural network, is a category of AI that attempts to emulate the way the human brain works

data driven website

an interactive website kept constantly updated and relevant to the needs of its customers using a database

Legacy system

an old system that is fast approaching or beyond the end of its useful life within an organization

market basket analysis

analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services

Business-to-consumer (B2C)

applies to any business that sells its products or services to consumers over the internet

Consumer-to-business (C2B)

applies to any consumer who sells a product or service to a business on the internet

Business-to-business (B2B)

applies to businesses buying from and selling to each other over the internet

Consumer-to-consumer (C2C)

applies to customers offering goods and services to each other on the internet

data modeling

apply mathematical techniques to identify trends and patterns in the data

Core processes

are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.

expert systems

are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

bugs

are defects in the code of an information system

data models

are logical data structures that detail the relationships among data elements using graphics or pictures.

Data

are raw facts that describe the charactersitics of an event or object.

attributes

are the data elements associated with an entity

Extended ERP components

are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations

Key Perfomance Indicator (KPI)

are the quantifiable metrics a company uses to evaluate progress toward critical success factors.

core ERP components

are the traditional components included in most ERP systems and primarily focus on internal operations

Structured query language

asks users to write lines of code to answer questions against a database?

Sales management CRM Systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts

Sales force automation

automatically tracks all the steps in te sales process, SFA products focus on increasing customer satisfaction, building customer relationships and improving product sales.

webinar

blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants

testing phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase

Porter's Three Generic Strategies

broad cost leadership, broad differentiation, focused strategy

discovery prototyping

builds a small-scale representation or working model of the system to ensure it meets the user and business requirements

Dynamic Report

changes automatically during creation

What-if analysis

checks the impact of a change in a variable or assumption on the model

Comparative Analysis

compares two or more data sets to identify patterns and trends

Data dictionary

compiles all of the metadata about the data elements in the data model

adware

computer software that displays advertisements

supply chain

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product

data mart

contains a subset of data warehouse information

podcasting

converts an audio broadcast to a digital music player

Hitbots

create the illusion that a large number of potential customers are clicking the advertisers links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser

chief user experience officer

create the optimal relationship between user and technology

Database Management System (DBMS)

creates, reads, updates, and deletes data in a database while controlling access and security

Finance

deals with strategic financial issues including money, banking, credit, investments, and assets

Software as a service

delivers applications over the cloud using a pay-per-use revenue model

deployment

deploy the discoveries to the organization for work in everyday business

project scope

describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project

test conditions

detail the steps the system must perform along with the expected result of each step

Metadata

details about data

data quality audits

determine the accuracy and completeness of its data

chief automation officer

determines if a person or business process can be replaced by a robot or software

estimation analysis

determines values for an unknown continuous variable behavior or estimated future value

customer segmentation

divides a market into categories that share similar attributes such as age, location, gender, habits, and so on

module software design

divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility

managerial level

employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change (semi-structured)

planning phase (SDLC)

establishes a high-level plan of the intended project and determines project goals

SWOT analysis

evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

Search engine ranking

evaluates variables that search engines use to determine where a URL appears on the list of search results

Goal-seeking analysis

finds the inputs necessary to achieve a goal such as a desired level of output

Support Value Activities

firm infrastructure, human resource management, technology development, procurement

Robotics

focuses on creating artificial intelligence devices that can move and react to sensory input

Supplier-relationship Management

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects

Partner relationship management (PRM)

focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel

call scripting systems

gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer.

pay-per call

generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call

Pay-per click

generates revenue each time a user clicks on a link to a retailer's website

pay-per conversion

generates revenue each time a website visitor is converted to a customer

object oriented languages

group data and corresponding processes into objects

Production and materials management ERP components

handle production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control

Structured Data

has a defined length, type, and format and includes numbers, dates, or strings such as customer address.

Crackers

have criminal intent when hacking

content management system

help companies manage the creation, storage, editing, and publication of their website content

Domain Name

identifies a URL address

source data

identifies the primary location where data is collected

Data Flow Diagram (DFD)

illustrates the movement of information between external entities and the processes and data stores within the system

Digital Darwinism

implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

Primary Value Activities

inbound logistics, operations, outbound logistics, marketing and sales, service

On-premise systems

include a server at a physical location using an internal network for internal access and firewalls for remote users' access

materials management

includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing

Logistics

includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain

Return on Investment (ROI)

indicated the earning power of a project

Four elements included in systems thinking?

input, process, output, feedback

enterprise resource planning system (ERP)

integrates all departments and functions throughout an organization into a single system so that employees can make decisions by viewing enterprise wide information on all business operations.

Sales analytics

involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence

Customer Analytics

involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities

Process Modeling

involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

Customer Relationship Management (CRM)

involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Management information systems (MIS)

is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.

repository

is a central location in which data is stored and managed.

Big Data

is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

Internet service provider

is a company that has a permanent connection to the Internet backbone

Static Report

is a created once based on data that does not change

Bug Bounty Program

is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.

Recommendation engine

is a data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products

A report

is a document containing organized in a table, matrix or graphical format allowing users to easily comprehend and understand information.

competitive advantage

is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

prototyping

is a modern design approach where the designers and system users use an iterative approach to building the system.

Disruptive Technology

is a new way of doing things that initially does not meet the needs of existing customers

Stakeholder

is a person or group that has an interest or concern in an organization

Ethical Hacker

is a person who hacks into a computer system to find vulnerabilities to help a company test its security

business model

is a plan that details how a company creates, delivers, and generates revenues

ebusiness model

is a plan that details how a company creates, delivers, and generates revenues on the Internet

foreign key

is a primary key of one table that appears as an attribute in other tables and acts to provide a logical relationship between the two tables.

Benchmarking

is a process of continuously measuring system results comparing those results to optimal system performance and identifying steps and procedures to improve system performance.

deep learning

is a process that employs specialized algorithms to model and study complex datasets

scripting language

is a programming method that provides for interactive modules to a website

telepresence robot

is a remote-controlled wheeled device with a display to enable video chat and videoconferencing.

Instant messaging

is a service that enables instant or real-time communication between people

methodology

is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges

Model

is a simpified representation or abstraction of reality

Executive information system (EIS)

is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight

Business process

is a standardized set of activities that accomplish a specific task, such as processing a customer's order

intelligent systems

is a type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn

system thinking

is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

Search engine

is a website software that finds other pages based on a keyword matching similar to google

data point

is an individual item on a graph or a chart

Cyborg anthropologist

is an individual who studies the interaction between humans and technology

Legacy system

is an old system that is fast approaching or beyond the end of its useful life within an organization

Web Real-time communications

is an open source project that seeks to embed real-time voice text and video communcations capbilites in web browsers

drone

is an unmanned aircraft that can fly autonomously or without a human

Ecommerce

is buying and selling goods and services over the internet

dynamic process

is continuously changing and provides business solutions to ever-changing business operations

Up-selling

is increasing the value of the sale

intellecutal property

is intangible creative work that is embodied in physical forms and includes copyrights, trademarks and patents.

Chief information Officer (CIO)

is responsible for (1) overseeing all uses of information technology and (2) ensuring the strategic alignment of IT with business goals and objectives (Manager, Leader, Communicator)

Chief Knowledge Officer (CKO)

is responsible for collecting, maintaining, and distributing the organization's knowledge.

Chief Data Officer (CDO)

is responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

Cross-selling

is selling additional products or services to an existing customer

Mass customization

is the ability of an organization to tailor its products or services to the customers' specifications.

click fraud

is the abuse of pay per click, pay per call and pay per conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser

Business process reengineering(BPR)

is the analysis and redesign of workflow within and between enterprises.

project management

is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements

Eprocurement

is the business to business (B2B) purchase and sale of supplies and services over the internet.

Data aggregation

is the collection of data from various sources for the purpose of data processing.

virtualization

is the creation of a virtual version of computing resources such as an operating system, a server a storage device or network resources.

Copyright

is the legal protection afforded an expression of an idea, such as a song, book or video game.

data stewardship

is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner

clickstream analytics

is the process f collecting , analyzing and reporting aggregate data about which pages a website visitor visits and in what order

requirements management

is the process of managing changes to the business requirements throughout the project.

Conversion

is the process of transferring information from a legacy system to a new system

procurement

is the purchasing of goods and service to meet the needs of the supply chain

Privacy

is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Analytics

is the science of fact-based decision making

Taxonomy

is the scientific classification of organisms into groups based on similarities of structure or origin

business analytics

is the scientific process of transforming data into insight for making better decisions.

URL Shotening

is the translation of a long URL into an abbreviated alternative that redirects to the longer URL

hybrid ERP

is to split the ERP functions between an on-premises ERP system and one or more functions handled as Software as a Service (SaaS) in the cloud

contact center

is where customer service representatives answer customer inquires and solve problems

Extreme programming (XP) methodology

like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete

Contact management CRM system

maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information

database

maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)

accounting and finance ERP components

manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

chief intellectual property officer

manage and defend intellectual property, copyrights, and patents

strategic level

managers develop overall business strategies, goals, and objectives as part of the company's strategic plan (unstructured )

Elogistics

manages the transportation and storage of goods

Social networking analysis

maps group contacts identifying who knows each other and who works together

black hat hackers

may just look around or may steal and destroy information

Effectivness MIS metrics

measure the impact MIS has on business processes and activities.

Efficiency metrics

measure the performance of MIS itself, such as throughput, transaction, speed and system availability.

Interactivity

measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement

Software Customization

modifies existing software according to the business's or user's requirements

Paradigm shift

occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave

website personalization

occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person

Bullwhip effect

occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

information silo

occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally

data set

organized collection of data

rational unified process (RUP) methodology

owned by IBM, provides a framework for breaking down the development of software into four gates

requirements definition document

prioritizes all of the business requirements by order of importance to the company

distributed computing

processes and manages algorithms across many machines in a computing environment

sustaining technology

produces an improved product that customers are eager to buy

fourth generation languages

programming languages that look similar to human languages

RFID's Electronic Product Code (RFID EPC)

promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag

Employee relationship management (ERM)

provides employees with a subset of CRM applications available through a web browser

cradle to grave

provides logistics support throughout the entire system or life of the product

Accounting

records, measures, and reports monetary transactions

long tail

referring to the tail of a typical sales curve

programming language

refers to a unique set of keywords

Ediscovery

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

Cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

granularity

refers to the level of detail in the model or the decision-making process

Enterprise Application Integration (EAI) Middleware

represents a new approach to middleware by packaging together commonly used functions such as providing prebuilt links to popular enterprise applications

Chief Security Officer (CSO)

responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses

affinity grouping analysis

reveals the relationship between variables along with the nature and frequency of the relationships

integrity restraints

rules that help ensure the quality of information

malware

software that is intended to damage or disable computers and computer systems.

counterfeit software

software that is manufactured to look like the real thing and sold as such

worm

spreads itself not only from file to file but also from computer to computer

Reintermediation

steps are added to the value chain as new players find ways to add value to the business process

entity

stores information about a person, place, thing, transaction, or event

Development Phase (SDLC)

takes all the detailed design documents from the design phase and transforms them into the actual system

forward integration

takes information entered into a given system and sends it automatically to all downstream systems and processes

Opportunity management CRM system

targets sales opportunities by finding new customers or companies for future sales

Patent

the exclusive right to make, use and sell an invention and is granted by a government to the investor.

Information Granularity

the extent of detail within the information

Analysis Phase of SDLC

the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system

implementation phase

the organization places the system into production so users can begin to perform actual business operations with it

Threat of new entrants

the power of competitors to enter a market

Buyer Power

the power of customers to drive down prices

Threat of substitute products or services

the power of customers to purchase alternatives

supplier power

the power of suppliers to drive up prices of materials

master data management (MDM)

the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems

Anomaly Detection

the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set

classification analysis

the process of organizing data into categories or groups for its most effective and efficient use

Data latency

the time it takes for data to be stored or retrieved

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

Veracity

the uncertainty of data, including biases, noise, and abnormalities

sign-off

the users' actual signatures indicating they approve all of the business requirements

Augmented Reality

the viewing of the physical world with computer-generated layers of information added to it

Clickstream data

they can observe the exact pattern of a consumer's navigation

five forces model

threat of substitutes, threat of new entrants, rivalry among existing firms, bargaining power of suppliers, bargaining power of buyers

business intelligence dashboards

track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis

Human resources ERP Components

track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws

digital dashboard

tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs

Primary key

uniquely identifies each record in a table

supply chain planning systems

use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory

static process

uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

Prescriptive analytics

uses techniques that create models indicating the best decision to make or course of action to take.

descriptive analytics

uses techniques that describe past performance and history

predictive analytics

uses techniques that extract information from data and use it to predict future trends and identify behavioral patterns.

haptic interface

uses technology allowing humans to interact with a computer through bodily sensations and movements.

The Child online protection Act

was passed to protect minors from accessing inappropriate material on the Internet

click to talk

which allow customers to click a button and talk with a representative via the Internet

Extraction, transformation, and loading (ETL)

which is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

disintermediation

which occurs when a business sells directly to the customer online and cuts out the intermediary


Conjuntos de estudio relacionados

Chapter 2: Beginnings of English America, 1607-1660

View Set

3C/D (VE/IM) - Department of the Air Force

View Set

Bob Brooks National Contracts Exam Questions

View Set

Saunders Immune Disorders & Medications

View Set

Chapter 4 muscles of the spine and thorax group

View Set