MIS Final Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Loyalty Card

A _____ is a marketing effort by a firm that is targeted at extracting information about an individual customer that might help the firm keep the customer faithful and satisfied.

Row

A horizontal set of data or components. In a graph, it is called the "x-axis." Contrast with column

Zero Day Exploits

A type of advanced cyber attack, finds a backdoor into a program and exploits it and steals small amounts of information that the company wouldnt know what even hit them

Field

In a database, _____ represent each category of data contained in a record

Linux (Created by)

Linus Torvalds created

Business Intelligence Systems

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____

Advantage of using OSS

You can modify and share code

Point-of-sale systems

_____ are critical for capturing sales data, and are usually linked to inventory systems to subtract out any sold items.

Contract manufacturing

_____ involves outsourcing production to third-party firms.

Enterprise Resource Planning

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.

Network Effects

a phenomenon whereby a product or service gains additional value as more people use it.

data warehouse

a set of databases designed to support decision making in an organization. It is structured for fast online queries and exploration.

Record

a single instance of whatever the table keeps track of.

ad hoc reporting tools

allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly.

Scalability

allows a firm to scale from start-up to blue chip without having to significantly rewrite their code, potentially saving big on software development costs.

RFID tags

are small chip-based tags that wirelessly emit a unique identifying code for the item that they are attached to.

Dashboards

provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics.

Canned Reports

provide regular summaries of information in a predetermined format. They're often developed by information systems staff and formats can be difficult to alter.

Customer Lifetime Value

represents the present value of the likely future income stream generated by an individual purchaser.

Application Software

software focuses on the work of a user or an organization.

Zara is susceptible to any disruption in northern Spain because:

it moves all of its deliveries through just two locations, both in Spain.

Software as a Service (SaaS)

software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. typically accessed by users using a thin client via a web browser.

Open Source Software

something people can modify and share because its design is publicly accessible.

Supply Chain Management

systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products and services at the point-of-consumption

Total Cost of Ownership (TCO)

systems that can include software development and documentation, or the purchase price and ongoing license and support fees, plus configuration, testing, deployment, maintenance, support, training, compliance auditing, security, backup, and provisions for disaster recovery.

Customer Relationship Management

systems used to support customer-related sales and marketing activities

black hat hackers

the bad guys. Some call them "crackers." There's even a well-known series of hacker conventions known as the Black Hat conference.

white hat hackers

the good guys who probe for weaknesses, but don't exploit them.

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Data mining

the process of using computers to identify hidden patterns and to build models from large data sets.

Contract manufacturers are widely criticized because:

they often employ child labor.

vertical integration

when a single firm owns several layers in its value chain.

Data Cube

which take data from standard relational databases, calculating and summarizing data for superfast reporting access. OLAP tools can present results through multidimensional graphs, or via spreadsheet-style cross-tab reports.

vertically integrated

.As the world's largest chain of coffee houses, Starbucks sources most of its raw materials such as coffee beans and vegetables from suppliers owned by it. It also holds equal or majority stakes in most of the foreign direct investment it carries out in other countries to set up franchisee coffee shops. Based on this information, Starbucks can be said to be

Types of Cyber Criminals

Account theft and illegal funds transfer, Stealing personal or financial data,Compromising computing assets for use in other crimes,Extortion,Espionage,Cyberwarfare,Terrorism,Pranksters, Protest hacking (hacktivism), Revenge (disgruntled employees)

information

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.

Ways to steal information

Extortion, espionage

High-end fashion house Prada's experiment of implementing the latest technology in its flagship store failed because

Prada assumed information systems are made up of only hardware and software.

Compiling

convert into a machine-code or lower-level form in which the program can be executed.

Data

The term _____ is used to refer to raw facts and figures.

Why Do tech Projects Fail

Unrealistic or unclear project goals, Poor project leadership and weak executive commitment , Inaccurate estimates of needed resources, Badly defined system requirements and allowing "feature creep" during development, Poor reporting of the project's status, Poor communication among customers, developers, and users , Use of immature technology, Unmanaged risks , Inability to handle the project's complexity, Sloppy development and testing practices, Poor project management, Stakeholder politics, Commercial pressures (e.g., leaving inadequate time or encouraging, corner-cutting) are all examples why.....

Over Engineering

When you start to assume things based of traits until you gain the knowledge to prove it or debunkit

It Project Outsourcing

Whether or not you want to do things your self or have other do it for you.

cybercrook

deliberately hops through several systems to make his path difficult to follow, slowing cross-border legal pursuit or even thwarting prosecution if launched from nations without extradition agreements.

Operating Systems

designed to create a platform so that programmers can write additional applications, allowing the computer to do even more useful things.

Black Swans

high-impact events

The PDAs used by Zara staff are linked to the store's point-of-sale system which shows:

how garments rank by sales

Debugging

identify and remove errors from computer software or hardware

Benefits enjoyed by SaaSvendors

improved system customization options and integration with standard software packages. And at times a lack of complexity can be a blessing—fewer choices can mean less training, faster start-up time, and lower costs associated with system use. But firms with unique needs may find SaaS restrictive.

Data mart

is a database focused on addressing the concerns of a specific problem

Relational DB

multiple tables are related based on common keys

Legacy systems

outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs.

Types of Malicious Code

phishing, botnets, trojan horses, spyware adware, worms, rootkit, scare ware, are all examples of..


Conjuntos de estudio relacionados

EMT Ch. 30: Chest Injuries STUDY SET

View Set

FP.14: Function, Purpose, and Regulation of Financial Institutions

View Set

1.10.T - Lesson: Topic 7: Virginia and Slavery Review & Test

View Set

FIN 3403 Exam 4 (Extra Problems)

View Set

5 - Life Insurance Underwriting and Policy Issue

View Set