IS 240 Final Exam
drive-by hacking
A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Client
A computer that is designed to request information from a server
data warehouse
A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks
Internet Corporation for Assigned Names and Numbers (ICANN)
A nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, and domain name system management.
change analyst
A person who is not afraid of change but makes changes only when there is a compelling reason to do so.
Vishing
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Typosquatting
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
sniffer
A program that hackers use to capture IDs and passwords on a network.
waterfall methodology
A sequence of phases in which the output of each phase becomes the input for the next
Protocol
A standard that specifies the format of data as well as the rules to be followed during transmission.
viral marketing
A technique that induces websites or users to pass on a marketing message
heat map
A two-dimensional graphical representation of data that uses different shades of color to indicate magnitude
spyware
A type of Malware that locates and saves data from users without them knowing about it.
Graphical User Interface (GUI)
A user interface which displays images and pictures that allows a computer user to interact with a computer easily.
mobile application management (MAM)
Administers and delivers applications to corporate and personal smartphones and tablets.
agile methodology
Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements
integration
Allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems
optimization
An extension of goal seeking in which the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies.
Project manager
An individual who is an expert in project planning and management
Building software applications
An internal wiki is a great tool for a company, and is a useful tool for all of the following except
Analysis of project risks
An organization must identify what project it wants to do and how it is going to do it. What does the "how" part of this question focus on?
Velocity
Analysis of streaming data as it travels around the Internet
All of these (chapter 13 and 14 quiz)
At a local marketing firm, Sofia is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Sofia must have to be able to perform her job?
A banner ad
Bethany Jones is a real estate agent who specializes in the luxury home market in the Orlando, FL, area. Bethany is highly technical and uses many types of online marketing techniques to increase business. One of most successful online marketing techniques is to place a rectangular graphic display along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bethany using?
Banner ad
Box running across a web page that contains advertisements
Online Transaction Processing (OLTP)
Capturing of transaction and event information using technology to process, store, and update
source documents
Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.
Rapid Application Development (RAD)
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process
operational level
Employees develop, control, and maintain core business activities required to run the day-to-day operations
Telecommunications system
Enables the transmission of data over public or private networks
analytical information
Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks
supply chain execution systems
Ensure supply chain cohesion by automating the different activities of the supply chain
Hackers
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
accurate, complete, consistent, timely, unique
Five Common Characteristics of High-Quality Information
Ensuring consumer protection
Hannah teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of the four ebusiness challenges which of the following is the most crucial challenge to consider before engaging in social media?
30 days
How many days is a typical sprint in the scrum methodology?
understand customer credit card usage and nonpayment rates
How would the banking industry use business intelligence?
Spatial data
Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
RUP Gates
Inception, Elaboration, Construction, Transition
Ebusiness
Includes eCommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners and exchanging real-time information
Business intelligence
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
Core drivers of the information age
Knowledge Business Intelligence Information
Online Analytical Processing (OLAP)
Manipulation of information to create business intelligence in support of strategic decision making
Universal resource locator (URL)
Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?
Metrics
Measurements that evaluate results to determine whether a project is meeting its goals
Political feasibility
Measures how well the solution will be accepted in a given organization.
Decision support system
Models information to support managers and business professionals during the decision-making process
open system
Nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate.
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person
3
On average, how many years longer does each generation live than the previous in the United States?
Decision Making Process
Problem identification Data collection Solution generation Solution test Solution selection Solution implementation
Procurement
Purchases inputs such as raw materials, resources, equipment, and supplies
Bluetooth
Refers to a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
Chief Privacy Officer (CPO)
Responsible for ensuring the ethical and legal use of information
Chief Technology Officer (CTO)
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
GPS
Satellite-based system for determining the absolute location of places or geographic features.
cookie
Small text file that a Web server stores on a computer.
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
Supply chain
Supplier > Manufacturer > Distributor > Retailer > Customer Information flows > Payment flows <
backward integration
Taking information entered into a given system and sending it automatically to all upstream systems and processes
ISP
The Internet service provider is a company that provides access to the Internet for a monthly fee.
802.11
The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as ________, for carrying out wireless local area network communication.
process
The computer program that processes the data
Supply Chain Management (SCM)
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability
Systems Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance
data element (or data field)
The smallest or basic unit of information
Collaborative engineering
What allows an organization to reduce the cost and time required during the design process of a product?
text analytics
What analyzes unstructured data to find trends and patterns in words and sentences?
Factors that are considered to be true, real, or certain without proof or demonstration.
What are project assumptions?
plan, source, make, deliver, return
What are the 5 basic supply chain activities?
EProcurement and elogistics
What are the primary features of ebusiness components?
project objectives
What are the quantifiable criteria that must be met for the project to b considered a success?
reporting, analyzing, predicting
What are the three phases of CRM?
infographics
What can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?
CASE
What do software engineers use as tools to provide automated support for the development of the system?
Application Programming Interface (API)
What does API stand for?
In-sourcing
What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems?
RFID Accelerometer
What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?
data map
What is a technique for establishing a match, or balance, between the source data and the target data warehouse?
Machine Learning
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn and processes?
Machine Learning
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn?
Snapshot
What is a view of data at a particular moment in time?
Mashup
What is a website or web application that uses content from more than one source to create a completely new product or service?
Personal area network
What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user?
outsourcing
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
Database
What is at the heart of any ERP system?
Enables users to get details, and details of details, of information
What is drill-down capability?
Data rich, information poor
What is it called when a manager has too much data and information to make a decision?
The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
What is loose coupling?
Applies technology to the activities in the order life cycle from inquiry to sale
What is selling chain management?
Measures the practicality of a technical solution and the availability of technical resources and expertise.
What is technical feasibility?
Click fraud
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
Fast data
What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?
Deep web
What is the large part of the Internet that is inaccessible to conventional search engines?
Communication
What is the most important part of the project plan?
real-time adaptive security
What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?
Connecting people by matching profile information
What is the primary way that social networks work?
Data mining
What is the process of analyzing data to extract information not offered by the raw data alone?
Cartography
What is the science and art of making an illustrated map or chart? GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and map
Bus Width
What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?
Cluster analysis
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
identity management
What is the term for a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?
Wire media
What is transmission material manufactured so that signals will be confined to a narrow path and will behave predictably?
Knowledge-dependent global society
What kind of society is being created by the growth in information industries?
Hypertext markup language
What links documents, allowing users to move from one to another simply by clicking on a hot spot or link?
Weak AI
What machines can still make their own decisions based on reasoning and past sets of data?
operational feasibility
What measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities?
Economic feasibility
What measures the cost-effectiveness of a project?
Packet-switching
What occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer?
ALU
What performs all arithmetic operations (for example, addition and subtraction) and all logic operations?
Twisted-pair cable
What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?
Opt out
What refers to denying permissions to incoming emails?
Project milestones
What represents key dates by which a certain group of activities must be performed?
Network operating system
What runs a network, steering information between computers and managing security and users?
Crowdfunding
What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?
Wide area network
What spans a large geographic area, such as a state, province, or country?
upstream
Where would you find the suppliers' supplier in a typical supply chain?
CRM
Which application's primary business benefits include sales forecasts, sales strategies, and marketing campaigns?
Detailed internal reports
Which internal reports present information with little or no filtering or restrictions of the data?
Which of the below is not an ISP? Comcast Netzero Facebook Earthlink
Downtime monitoring policy
Which of the below is not one of the six policies that a company should implement for information protection as discussed in the text?
Core competencies, market leaders, cost advantages, excellent management.
Which of the following are included as potential internal strengths in a SWOT analysis that are helpful to an organization?
Static text-based information websites.
Which of the following best describes Web 1.0?
Based on the "intelligent" web where applications use natural language processing.
Which of the following best describes Web 3.0?
A nonrepudiation clause
Which of the following clauses is typically contained in an acceptable use policy?
All of the above
Which of the following describes agile methodology? Fast and efficient Fewer Features all of the above lower cost
Uses GPS tracking to track vehicles
Which of the following describes automatic vehicle location (AVL)?
Collaboration system
Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
All of these
Which of the following is an extended ERP component? Customer relationship management All of these Business intelligence Ebusiness
Star
Which of the following is not a network topology? Bus Star Ethernet Ring
The cost of health care will decrease
Which of the following is not a potential business impact from people in developed countries living longer?
sears
Which of the following is not included in the top five companies that are expecting future growth to be generated from new investments?
Sustaining technology
Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
All of these
Which of the following questions can materials management help a company answer? What items are running low in the warehouse? What items are at risk of spoiling in the warehouse? What are our current inventory levels? All of these.
All devices are connected to a central cable or backbone
Which of the following represents the bus topology?
All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.
Which of the following represents the ring topology?
Opportunities and threats originate outside an organization.
Which of the following statements is correct when considering a SWOT analysis?
Marketing, sales, and accounting departments decide to use the same vendor for a new system.
Which of the following will help an organization maintain consistent business operations?
Walmart
Which of the following would not be considered a company operating in the long tail of a typical sales curve Zippos itunes netflix walmart
social media policy
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
viral marketing
Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?
project stakeholders
Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion?
Accounting, finance, logistics, and production
Who are the primary users of ERP systems?
Customers, resellers, partners, suppliers, and distributors
Who are the primary users of SCM systems?
executive sponsor
Who is the person or group who provides the financial resources for the project?
software customization
Within software customization, what is key for business process support that spans functional areas and legacy systems?
Data Broker
a business that collects personal information about consumers and sells that information to other organizations
Click-and-Mortar Business
a business that operates in a physical store and on the internet
Brick-and-Mortar Business
a business that operates in a physical store without an internet presence
Pure-play business
a business that operates on the internet only without a physical store
makerspaces
a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable
Click through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
click through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
maker movement
a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things
variable
a data characteristic that stands for a value that changes or varies over time
uplift modeling
a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products
fuzzy logic
a mathematical method of handling imprecise or subjective information
information integrity
a measure of the quality of information
COBIT
a set of standard practices that are often used in the assessment stage of the BPM cycle
virus
a software written with malicious intent to cause annoyance or damage
Sensitivity Analysis
a special case of what-if analysis, is the study of the impact on other variables when one variable is changed repeatedly
Electronic Data interchange
a standard format for the electronic exchange of information between supply chain participants
Algorithm
a step-by-step procedure for solving a problem
Data lake
a storage repository that holds a vast amount of raw data in its original format until the business needs it
Search Engine Optimization (SEO)
a systematic process of ensuring that your firm comes up at or near the top of lists of typical search phrases related to your business
spoofing
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
cluster analysis
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible
Digital Rights Management
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
intermediaries
agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
Web-based self service systems
allow customers to use the web to find answers to their questions or solutions to their problems
Associate program
allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website
video conference
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards
neural network
also called an artificial neural network, is a category of AI that attempts to emulate the way the human brain works
data driven website
an interactive website kept constantly updated and relevant to the needs of its customers using a database
Legacy system
an old system that is fast approaching or beyond the end of its useful life within an organization
market basket analysis
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet
Consumer-to-business (C2B)
applies to any consumer who sells a product or service to a business on the internet
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
Consumer-to-consumer (C2C)
applies to customers offering goods and services to each other on the internet
data modeling
apply mathematical techniques to identify trends and patterns in the data
Core processes
are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.
expert systems
are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
bugs
are defects in the code of an information system
data models
are logical data structures that detail the relationships among data elements using graphics or pictures.
Data
are raw facts that describe the charactersitics of an event or object.
attributes
are the data elements associated with an entity
Extended ERP components
are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
Key Perfomance Indicator (KPI)
are the quantifiable metrics a company uses to evaluate progress toward critical success factors.
core ERP components
are the traditional components included in most ERP systems and primarily focus on internal operations
Structured query language
asks users to write lines of code to answer questions against a database?
Sales management CRM Systems
automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts
Sales force automation
automatically tracks all the steps in te sales process, SFA products focus on increasing customer satisfaction, building customer relationships and improving product sales.
webinar
blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
testing phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase
Porter's Three Generic Strategies
broad cost leadership, broad differentiation, focused strategy
discovery prototyping
builds a small-scale representation or working model of the system to ensure it meets the user and business requirements
Dynamic Report
changes automatically during creation
What-if analysis
checks the impact of a change in a variable or assumption on the model
Comparative Analysis
compares two or more data sets to identify patterns and trends
Data dictionary
compiles all of the metadata about the data elements in the data model
adware
computer software that displays advertisements
supply chain
consists of all parties involved, directly or indirectly, in obtaining raw materials or a product
data mart
contains a subset of data warehouse information
podcasting
converts an audio broadcast to a digital music player
Hitbots
create the illusion that a large number of potential customers are clicking the advertisers links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser
chief user experience officer
create the optimal relationship between user and technology
Database Management System (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security
Finance
deals with strategic financial issues including money, banking, credit, investments, and assets
Software as a service
delivers applications over the cloud using a pay-per-use revenue model
deployment
deploy the discoveries to the organization for work in everyday business
project scope
describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project
test conditions
detail the steps the system must perform along with the expected result of each step
Metadata
details about data
data quality audits
determine the accuracy and completeness of its data
chief automation officer
determines if a person or business process can be replaced by a robot or software
estimation analysis
determines values for an unknown continuous variable behavior or estimated future value
customer segmentation
divides a market into categories that share similar attributes such as age, location, gender, habits, and so on
module software design
divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility
managerial level
employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change (semi-structured)
planning phase (SDLC)
establishes a high-level plan of the intended project and determines project goals
SWOT analysis
evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
Search engine ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results
Goal-seeking analysis
finds the inputs necessary to achieve a goal such as a desired level of output
Support Value Activities
firm infrastructure, human resource management, technology development, procurement
Robotics
focuses on creating artificial intelligence devices that can move and react to sensory input
Supplier-relationship Management
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects
Partner relationship management (PRM)
focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
call scripting systems
gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer.
pay-per call
generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call
Pay-per click
generates revenue each time a user clicks on a link to a retailer's website
pay-per conversion
generates revenue each time a website visitor is converted to a customer
object oriented languages
group data and corresponding processes into objects
Production and materials management ERP components
handle production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control
Structured Data
has a defined length, type, and format and includes numbers, dates, or strings such as customer address.
Crackers
have criminal intent when hacking
content management system
help companies manage the creation, storage, editing, and publication of their website content
Domain Name
identifies a URL address
source data
identifies the primary location where data is collected
Data Flow Diagram (DFD)
illustrates the movement of information between external entities and the processes and data stores within the system
Digital Darwinism
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
Primary Value Activities
inbound logistics, operations, outbound logistics, marketing and sales, service
On-premise systems
include a server at a physical location using an internal network for internal access and firewalls for remote users' access
materials management
includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing
Logistics
includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain
Return on Investment (ROI)
indicated the earning power of a project
Four elements included in systems thinking?
input, process, output, feedback
enterprise resource planning system (ERP)
integrates all departments and functions throughout an organization into a single system so that employees can make decisions by viewing enterprise wide information on all business operations.
Sales analytics
involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence
Customer Analytics
involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities
Process Modeling
involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
Customer Relationship Management (CRM)
involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
Management information systems (MIS)
is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.
repository
is a central location in which data is stored and managed.
Big Data
is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
Internet service provider
is a company that has a permanent connection to the Internet backbone
Static Report
is a created once based on data that does not change
Bug Bounty Program
is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
Recommendation engine
is a data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products
A report
is a document containing organized in a table, matrix or graphical format allowing users to easily comprehend and understand information.
competitive advantage
is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
prototyping
is a modern design approach where the designers and system users use an iterative approach to building the system.
Disruptive Technology
is a new way of doing things that initially does not meet the needs of existing customers
Stakeholder
is a person or group that has an interest or concern in an organization
Ethical Hacker
is a person who hacks into a computer system to find vulnerabilities to help a company test its security
business model
is a plan that details how a company creates, delivers, and generates revenues
ebusiness model
is a plan that details how a company creates, delivers, and generates revenues on the Internet
foreign key
is a primary key of one table that appears as an attribute in other tables and acts to provide a logical relationship between the two tables.
Benchmarking
is a process of continuously measuring system results comparing those results to optimal system performance and identifying steps and procedures to improve system performance.
deep learning
is a process that employs specialized algorithms to model and study complex datasets
scripting language
is a programming method that provides for interactive modules to a website
telepresence robot
is a remote-controlled wheeled device with a display to enable video chat and videoconferencing.
Instant messaging
is a service that enables instant or real-time communication between people
methodology
is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges
Model
is a simpified representation or abstraction of reality
Executive information system (EIS)
is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight
Business process
is a standardized set of activities that accomplish a specific task, such as processing a customer's order
intelligent systems
is a type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn
system thinking
is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.
Search engine
is a website software that finds other pages based on a keyword matching similar to google
data point
is an individual item on a graph or a chart
Cyborg anthropologist
is an individual who studies the interaction between humans and technology
Legacy system
is an old system that is fast approaching or beyond the end of its useful life within an organization
Web Real-time communications
is an open source project that seeks to embed real-time voice text and video communcations capbilites in web browsers
drone
is an unmanned aircraft that can fly autonomously or without a human
Ecommerce
is buying and selling goods and services over the internet
dynamic process
is continuously changing and provides business solutions to ever-changing business operations
Up-selling
is increasing the value of the sale
intellecutal property
is intangible creative work that is embodied in physical forms and includes copyrights, trademarks and patents.
Chief information Officer (CIO)
is responsible for (1) overseeing all uses of information technology and (2) ensuring the strategic alignment of IT with business goals and objectives (Manager, Leader, Communicator)
Chief Knowledge Officer (CKO)
is responsible for collecting, maintaining, and distributing the organization's knowledge.
Chief Data Officer (CDO)
is responsible for determining the types of information the enterprise will capture, retain, analyze, and share.
Cross-selling
is selling additional products or services to an existing customer
Mass customization
is the ability of an organization to tailor its products or services to the customers' specifications.
click fraud
is the abuse of pay per click, pay per call and pay per conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
Business process reengineering(BPR)
is the analysis and redesign of workflow within and between enterprises.
project management
is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements
Eprocurement
is the business to business (B2B) purchase and sale of supplies and services over the internet.
Data aggregation
is the collection of data from various sources for the purpose of data processing.
virtualization
is the creation of a virtual version of computing resources such as an operating system, a server a storage device or network resources.
Copyright
is the legal protection afforded an expression of an idea, such as a song, book or video game.
data stewardship
is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner
clickstream analytics
is the process f collecting , analyzing and reporting aggregate data about which pages a website visitor visits and in what order
requirements management
is the process of managing changes to the business requirements throughout the project.
Conversion
is the process of transferring information from a legacy system to a new system
procurement
is the purchasing of goods and service to meet the needs of the supply chain
Privacy
is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Analytics
is the science of fact-based decision making
Taxonomy
is the scientific classification of organisms into groups based on similarities of structure or origin
business analytics
is the scientific process of transforming data into insight for making better decisions.
URL Shotening
is the translation of a long URL into an abbreviated alternative that redirects to the longer URL
hybrid ERP
is to split the ERP functions between an on-premises ERP system and one or more functions handled as Software as a Service (SaaS) in the cloud
contact center
is where customer service representatives answer customer inquires and solve problems
Extreme programming (XP) methodology
like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete
Contact management CRM system
maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information
database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
accounting and finance ERP components
manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
chief intellectual property officer
manage and defend intellectual property, copyrights, and patents
strategic level
managers develop overall business strategies, goals, and objectives as part of the company's strategic plan (unstructured )
Elogistics
manages the transportation and storage of goods
Social networking analysis
maps group contacts identifying who knows each other and who works together
black hat hackers
may just look around or may steal and destroy information
Effectivness MIS metrics
measure the impact MIS has on business processes and activities.
Efficiency metrics
measure the performance of MIS itself, such as throughput, transaction, speed and system availability.
Interactivity
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement
Software Customization
modifies existing software according to the business's or user's requirements
Paradigm shift
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave
website personalization
occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person
Bullwhip effect
occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain
information silo
occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally
data set
organized collection of data
rational unified process (RUP) methodology
owned by IBM, provides a framework for breaking down the development of software into four gates
requirements definition document
prioritizes all of the business requirements by order of importance to the company
distributed computing
processes and manages algorithms across many machines in a computing environment
sustaining technology
produces an improved product that customers are eager to buy
fourth generation languages
programming languages that look similar to human languages
RFID's Electronic Product Code (RFID EPC)
promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag
Employee relationship management (ERM)
provides employees with a subset of CRM applications available through a web browser
cradle to grave
provides logistics support throughout the entire system or life of the product
Accounting
records, measures, and reports monetary transactions
long tail
referring to the tail of a typical sales curve
programming language
refers to a unique set of keywords
Ediscovery
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
Cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
information richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
granularity
refers to the level of detail in the model or the decision-making process
Enterprise Application Integration (EAI) Middleware
represents a new approach to middleware by packaging together commonly used functions such as providing prebuilt links to popular enterprise applications
Chief Security Officer (CSO)
responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses
affinity grouping analysis
reveals the relationship between variables along with the nature and frequency of the relationships
integrity restraints
rules that help ensure the quality of information
malware
software that is intended to damage or disable computers and computer systems.
counterfeit software
software that is manufactured to look like the real thing and sold as such
worm
spreads itself not only from file to file but also from computer to computer
Reintermediation
steps are added to the value chain as new players find ways to add value to the business process
entity
stores information about a person, place, thing, transaction, or event
Development Phase (SDLC)
takes all the detailed design documents from the design phase and transforms them into the actual system
forward integration
takes information entered into a given system and sends it automatically to all downstream systems and processes
Opportunity management CRM system
targets sales opportunities by finding new customers or companies for future sales
Patent
the exclusive right to make, use and sell an invention and is granted by a government to the investor.
Information Granularity
the extent of detail within the information
Analysis Phase of SDLC
the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system
implementation phase
the organization places the system into production so users can begin to perform actual business operations with it
Threat of new entrants
the power of competitors to enter a market
Buyer Power
the power of customers to drive down prices
Threat of substitute products or services
the power of customers to purchase alternatives
supplier power
the power of suppliers to drive up prices of materials
master data management (MDM)
the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems
Anomaly Detection
the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set
classification analysis
the process of organizing data into categories or groups for its most effective and efficient use
Data latency
the time it takes for data to be stored or retrieved
pirated software
the unauthorized use, duplication, distribution, or sale of copyrighted software
Veracity
the uncertainty of data, including biases, noise, and abnormalities
sign-off
the users' actual signatures indicating they approve all of the business requirements
Augmented Reality
the viewing of the physical world with computer-generated layers of information added to it
Clickstream data
they can observe the exact pattern of a consumer's navigation
five forces model
threat of substitutes, threat of new entrants, rivalry among existing firms, bargaining power of suppliers, bargaining power of buyers
business intelligence dashboards
track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis
Human resources ERP Components
track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws
digital dashboard
tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs
Primary key
uniquely identifies each record in a table
supply chain planning systems
use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory
static process
uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
Prescriptive analytics
uses techniques that create models indicating the best decision to make or course of action to take.
descriptive analytics
uses techniques that describe past performance and history
predictive analytics
uses techniques that extract information from data and use it to predict future trends and identify behavioral patterns.
haptic interface
uses technology allowing humans to interact with a computer through bodily sensations and movements.
The Child online protection Act
was passed to protect minors from accessing inappropriate material on the Internet
click to talk
which allow customers to click a button and talk with a representative via the Internet
Extraction, transformation, and loading (ETL)
which is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
disintermediation
which occurs when a business sells directly to the customer online and cuts out the intermediary