MIS Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Public Key Encryption

Two key system used for securing electronic transmissions

Linux

An open source software operating system.

expert systems

computer program that uses AI tech to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field

deeplearning

a type of machine learning that uses multiple layers of interconnections among data to identify patterns and improve predicted results- applied in tasks like speech recognition, image recognition, and computer vision

type 1

hardware, hypervisor, OS

cheap land, low-cost power, ultrafast fiber-optic connections, and mild climates

requierements of server farms

CAPTCHAs

An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHAs are those scrambled character images that many sites require to submit some sort of entry (account setup, ticket buying) and are meant to be a Turing Test—a test to distinguish if a task is being performed by a computer or a human.

CAPTCHAs

An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing Test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.

graphical query tools

Allow a user to create a query through a point-and-click or drag-and-drop interface, rather than requiring programming knowledge.

security-focused

Also known as "hardened." Term used to describe technology products that contain particularly strong security features.

Integrated Development Environment (IDE)

An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools.

feature creep

An expansion of the scope of a project.

provider: applications, data, OS, virtualization, servers, storage, networking

SaaS

encryption

Scrambling data using a CODE or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Service-oriented architecture (SOA)

Set of Web services built around an organization's processes and procedures

web services

Small pieces of code that are accessed via the application server which permit interoperable machine-to-machine interaction over a network.

firmware

Software stored on nonvolatile memory chips

wisdom of crowds

The idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals.

scrum

The leading agile development methodology for completing projects with a complex, innovative scope of work

artificial intelligence

The science of designing and programming computer systems to do intelligent things and to simulate human thought processes, such as intuitive reasoning, learning, and understanding language.

machine learning

The science of getting machines to learn and act in a similar way to humans while also autonomously learning from real-world interactions and sets of teaching data that we feed them

SMART

The social media awareness and response team. A group tasked with creating policies and providing support, training, guidance, and development expertise for and monitoring of a firm's social media efforts.

interpreted

command are -- within their applications, rather than compiled to run directly by a microprocessor

risk assessment team

consider vulnerabilities and countermeasure investments

vigilance

constant -- regarding security needs to be-part of one's individual skill set, and key component in orgs culture

containers

a type of virtualization that allows for shared operating systems for more resource savings and faster execution

Unsupervised Machine Learning

algorithms are used when the information used to train is neither classified nor labeled

Supervised Machine Learning

algorithms can apply what has been learned in the past to new data using labeled examples to predict future events

platform specific

applications are --

row (record)

collection of a set of values for all fields in one table

firewalls, intrusion detection systems, blacklists, whitelists

lock down networks

program

malware is any -- or file that is harmful to a computer user

SEO rankings

material deemed useful is likely to gain more Web links and cause firm-affiliated content to rise in --, making the firm easier to find

shoulder surfing

physical threats; Gaining compromising information through observation (as in looking over someone's shoulder).

dumpster diving

physical threats; combing through trash to identify valuable assets

business intelligence

technologies, applications, and practices for the collection, integration, analysis, and presentation of business information

computer-to-computer exchange

the -- of business documents from a retailer to a vendor and back

survey

the collection of data by having people answer a series of questions

effectively zero

the marginal cost of producing an additional copy of a software product is

Database Management System (DBMS)

creates, reads, updates, and deletes data in a database while controlling access and security

zero-day exploit

cyber attack that occurs on the same day a weakness is discovered in software

phishing

cyber attack that uses disguised email as a weapon

transactional system, relation databases, regular cadence

data flows into a data warehouse from --, --, and other sources on a --

repositories of summarized

data marts contain -- data collected for analysis on a specific section or unit within an organization

mathematical

data mining uses sophisticated -- algorithms to segment the data and evaluate the probability of future events

data-driven , fact-based

decision making is --, --

risks associated w SaaS

dependence on a single vendor, concern about long-term viability of partner firms, reliance on network connection, data assets store offsite may lead to security concerns, limited configuration, customization, an integration. UI of web-based software is less sophisticated

information

derived from combining data to resolve the uncertainty possessed by data, thereby providing answers to simple questions

knowledge

insight derived from experience and expertise

crowdsourcing

inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process

bad data

using -- in data mining can give wrong estimates

viral

when information or applications spread rapidly between users

relation

when the data in one table can be related to the data in another table

peer production

when users collaboratively work to create content, products, and services

cost effective, security/transparency, easy integration, quality, availability of source code

why open source?

sharing

wiki acts as a collective corporate memory that is vital for --

lock down partners

•Insist on partner firms being compliant with security guidelines and audit them regularly. •Use access controls to control data access on a need-to-know basis. •Use recording, monitoring, and auditing to hunt for patterns of abuse. •Maintain multiple administrators to jointly control key systems.

Hadoop

a set of mostly open-source tools to manage massive amounts of unstructured data for storage, extraction, and computation

field

a single characteristic of data that appears in a table as a column

enterprise resource planning

a software package that integrates the many functions of a business

neutral point of view

an editorial style that is free of bias and opinion

social network

an online community that allows users to establish a personal profile and communicate with others

database server, analytics engine, presented results

basic components of data warehouse

variety, volumes, velocity

big data is data that contains greater -- arriving in increasing -- and with ever-higher --

reporting, analysis

business intelligence is systems that use data created by other systems to provide -- and -- for organizational decision making

packaged enterprise system

can streamline processes, make data more usable, and ease the linking of systems with software across the firm and with key business partners

accelerate

cloud computing can -- innovation

pools of computing resources

cloud computing is -- that reside inside an organization and that can be served up for specific tasks as need arrives

database

A single table or a collection of related tables.

table

An arrangement of data made up of horizontal rows and vertical columns.

data cube

A special database used to store data in OLAP reporting.

data aggregators

Firms that collect and resell data.

technology threats

- Compromising poorly designed software - Push-Button hacking: Tools designed to easily automate attacks. - Network threats: Network itself is a source of compromise.

have failure and recovery plans

- Employ recovery mechanisms to regain control if key administrators are incapacitated or uncooperative. - Broad awareness reduces organizational stigma in coming forward. - Share knowledge on hacking techniques with technology partners.

computing hardware

- Storage devices - Input devices - Output devices

unstructured, structured

-,-, big, and costly to work through conventional data bases because of large amount of data

compromising

-- computing assets for use in other crimes

Scalable

-- computing resources can help a firm deal with spiking impact from Black Swan events

markup, encoding

-- language that defines a set of rules for -- documents in a format that is both human-readable and machine-readable

server, client

-- program that fulfills the request of a --

client, server

-- software program that makes requests of a -- program

paid media

Refers to efforts where an organization pays to leverage a channel or promote a message.

bad apples

Rogue employees who steal secrets, install malware, or hold a firm hostage

social engineering

A non-technical method of intrusion that relies on human interaction and often involves tricking people into breaking normal security procedures.

physical threats

-Dumpster Diving -Shoulder Surfing -Brute-force Attacks

JSON

A popular data interchange format. It is often used when receiving data from Web services, e.g. Google Vision API

data, information

knowledge is based on

service level agreement

A negotiated agreement between the customer and the vendor. The -- may specify the levels of availability, serviceability, performance, operation, or other commitment requirements.

software

A computer program or a collection of programs. It is a precise set of instructions that tells hardware what to do.

cloud bursting

A configuration that's set up between a private cloud and a public cloud. If 100 percent of the resource capacity in a private cloud is used, then overflow traffic is directed to the public cloud using cloud bursting.

Capability Maturity Model Integration (CMMI)

A process-improvement approach (useful for but not limited to software engineering projects) that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement.

expert systems

A set of technologies used in the development of AI systems that use a set of programmed decision rules or example outcomes to perform a task in a way that mimics applied human expertise.

agile development

A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery.

software package

A software product offered commercially by a third party.

neural networks

A statistical techniques used in AI, and particularly in machine learning. Neural networks hunt down and expose patterns, building multilayered relationships that humans can't detect on their own.

hack

A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution.

Turing test

A test proposed by Alan Turing in which a machine would be judged "intelligent" if the software could use conversation to fool a human into thinking it was talking with a person instead of a machine.

query tools

A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria.

certificate authority

A trusted third party that provides authentication services in public key encryption schemes.

semi-supervised learning

A type of machine learning where the data used to build models contains data with explicit classifications, but is also free to develop its own additional classifications that may further enhance result accuracy.

e-discovery

Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.

malware

Any program that is harmful to a computer or, by extension, a computer user.

desktop software

Applications installed on a personal computer, typically supporting tasks performed by a single user.

enterprise software

Applications that address the needs of multiple users throughout an organization or work group.

trojans

Attempt to sneak in by masquerading as something they're not

Transaction Processing System (TPS)

Basic business system that serves the operational level and assists in making structured decisions

Over-engineering

Building a model with so many variables that it will only work on the data you used to create the model. (BTW, this is also known as "overfitting". )

decision making

Choosing among two or more alternatives.

Platform as a Service (PaaS)

Cloud providers offer services for customers to build their own applications on the provider's infrastructure.

Infrastructure as a Service (IaaS)

Cloud providers offer services that include running the remote hardware, storage, and networking.

Key

Code that unlocks encryption.

owned media

Communication channels that an organization controls. These can include firm-run blogs, Web sites, apps, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram.

firewalls

Control network traffic, block unauthorized traffic

cash-out fraudsters

Criminals that purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.

data harvesters

Cybercriminals who infiltrate systems and collect data for illegal resale.

blacklists

Deny the entry of specific IP addresses and other entities

applications

Desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations

analytics

Driving decisions and actions through extensive use of: -Data -Statistical and quantitative analysis -Explanatory and predictive models -Fact-based management

astroturfing

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.

compliance

Ensuring that an organization's systems operate within required legal constraints, and industry and organizational obligations

ETL

Extraction, Transformation, and Loading- key step in getting data into a data warehouse/mart

LAMP

Linux, Apache, MySQL, PHP (powers many sites we visit each day)

sock puppet

Fake online persona created to promote a particular point of view, product, or individual

Software as a Service (SaaS)

Firm subscribes to a third-party software and receives a service that is delivered online

customer: applications, data, OS provider: virtualization, servers, storage, networking

IaaS

embassy

In the context of social media, an established online presence where customers can reach and interact with the firm. An effective embassy approach uses a consistent firm name in all its social media properties.

wikimasters

Individuals often employed by organizations to review community content in order to delete excessive posts, move commentary to the best location, and edit as necessary.

griefers

Internet vandal and mischief maker; also sometimes referred to as a troll.

Biometrics

Measure and analyze human body characteristics for identification or authentication

user interface

Mechanism through which users interact with a computing device

waterfall method

Method in which the systems development life cycle tasks occur sequentially, with one activity starting only after the previous one has been completed.

Intrusion Detection System (IDS)

Monitor network use for hacking attempts and take preventive action

cost

OSS lowers the -- of computing and makes computing options accessible to smaller firms

operating systems

OSX, Linux, Windows

customer: applications, data provider: OS, virtualization, servers, storage, networking

PaaS

whitelists

Permit communication only with approved entities or in an approved manner

long tail

Phenomenon whereby firms can make money by offering a near-limitless selection of contents and products

computing hardware

Physical components of information technology, which includes the computer and its peripherals

prediction market

Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.

lock down hardware

Prevent unapproved software installation. Force file saving to hardened, backed-up, and monitored servers. Reimage hard drives of end-user PCs. Disable boot capability of removable media. Prevent Wi-Fi use and require VPN encryption for network transmissions.

analytics, statistical, and graphical computing

R deals with

data cloud

Sometimes referred to as cloud data warehousing, this term refers to a cloud service that provides tools to extract and transform data from disparate sources so that it can be interrogated as needed. Unlike data warehouses, data lakes, or similar tools that an organization might run on-site, a data cloud can be spun up to temporarily hold a very large amount of data for short-term use, then disbanded when it is no longer needed. Snowflake is the best known of the many firms providing services in this space.

vertical niches

Sometimes referred to as vertical markets. Products and services designed to target a specific industry (e.g., pharmaceutical, legal, apparel retail).

embedded systems

Special-purpose software designed and included inside physical products

compile

Step in which program code written in a language that humans can more easily understand, is then converted into a form (expressed in patterns of ones and zeros) that can be understood and executed by a microprocessor. Programmers using conventional programming languages must compile their software before making it available for execution.

botnets

Surreptitiously infiltrated computers, controlled remotely

supply chain management

Systems that can help a firm manage aspects of its value chain through delivery of finished products and services at the point-of-consumption.

Customer Relationship Management (CRM)

Systems used to support customer-related sales and marketing activities.

black swans

Unpredicted, but highly impactful events

Structured Query Language (SQL)

Used to create and manipulate databases

WYSIWYG

What You See Is What You Get

free rider problem

When others take advantage of a user or service without providing any sort of reciprocal benefit.

data mart

contains a subset of data warehouse information oriented to a specific business line

closely guarded secrets, never

conventional software firms treat their intellectual property like --, and the almost -- provide the source code

deepfake

creates bogus media by AI

funds, other

diverts -- that can be used for -- competitive initiatives and encouraging innovation

offline

e-discovery can be carried out -- on a particular computer or it can be done in a network

acquisition

efficient and integrated enterprise systems may also make firms more attractive -- targets or makes it easier for a firm to acquire other firms and realize benefits

device specific

embedded systems are --

trained, understand

employees should be -- and -- the penalties

Ubuntu.com

example of OSS

NO

is linux common on desktops?

legacy systems

older information systems that remain in use because they still function and are costly to replace (incompatible systems)

blogs

online journals where people and companies post their thoughts and other content, usually related to narrowly defined topics

OCR

optical character recognition, the branch of computer science that involves reading text from paper and translating the images into a form that the computer can manipulate

free

other SaaS firms offer -- services supported by advertising

upgraded/premium

other SaaS firms promote the sale of -- versions for additional fees

streamline processes, usable, linking , business partners

packaged enterprise system can --, make data more --, and ease the -- of systems with software across the firm and with key --

disguised email

phishing utilizes

brue-force attacks

physical threat; trial and error method used by application programs to decode encrypted data such as password

network threats

tech threat, Network itself is a source of compromise

distributed computing

processes and manages algorithms across many machines in a computing environment

platform

products and services that allow for the development and integration of software products and other complementary goods

APIs

programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data

Application Programming Interface

programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data

earned media

promotions that grow organically from customer efforts or other favorable publicity. Social media can be a key driver of earned media (think positive tweets, referring Facebook posts, and pins on Pinterest).

automatic discovery, predictions, creations of info, focus on large data sets

properties of data mining

canned reports

provide regular summaries of information in a predetermined format

incompatible systems

reason for poor information

cloud computing

replacing computing resources with services provided over the internet

execute within an application

scripting languages ---

neutral network

series of algorithms that endeavors to recognize underlying relationships in a set of data through process that mimics the way that the human brain operates

margin structure

shifting to cloud computing modifies the -- for many in the computing industry

Distributed Denial of Service (DDoS)

shutting down websites by overwhelming them with a crushing load of what seems like legitimate requests sent simultaneously by thousands of machines (Multiple computers)

Enterprise Resource Planning (ERP)

slaes/inventory, manufactoring/purchasing, HR, order tracking and decision support

data mining

using computers to identify hidden patterns in large data sets and to build models from this data

support and consulting services

vendors make money on OSS by selling --

web 2.0

web applications that facilitate interactive information sharing, interoperability, user-centered design, and interactivity

Multi-factor authentication

when identity is proven by presenting more than one item for proof of credentials

external sources

information provided by the media and other people

spoofing

The act of disguising a communication from an unknown source as being from a known, trusted source.

primary key

A field (or group of fields) that uniquely identifies a given entity in a table

utility computing

A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider's computers.

Data Visualization

A graphical representation of data

dashboards

A heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.

server farm

A massive network of computer servers running software to coordinate their collective use

hash tag

A method for organizing tweets where keywords are preceded by the # character.

genetic algorithms

A method for solving both constrained and unconstrained optimization problems that is based on natural selection, the process that drives biological evolution. They are commonly used to generate high-quality solutions to optimization and search problems by relying on bio-inspired operators.

Online Analytical Processing (OLAP)

A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube.

serverless computing

A type of cloud computing where a third-party vendor manages servers, replication, fault-tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building "Business Solutions" and eliminating the need to spend time and resources managing the technology complexity of much of the underlying "IT Solution."

Wiki

A website that can be modified by anyone, from directly within a web browser (provided that user is granted edit access).

scalability

Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren't scalable often require significant rewrites or the purchase or development of entirely new systems.

total cost of ownership

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system.

total cost of ownership

An economic measure of the full cost of owning a product (typically computing hardware and/or software). TCO includes direct costs such as purchase price, plus indirect costs such as training, support, and maintenance.

black hat hacker

Computer criminals who exploit a system's weakness for personal gain

database administrator

Job focused on directing, performing, or overseeing activities associated with a database or set of databases

interpreted

Languages where each line of written code is converted for execution at run-time.

Hactivists

a protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage

Java

Programming language designed to provide true platform independence for application developers

scripting languages

Programming tool that executes within an application. -- are interpreted within their applications, rather than compiled to run directly by a microprocessor.

omnichannel

Providing customers with a unified experience across customer channels, which may include online, mobile, catalog, phone, and retail. Pricing, recommendations, and incentives should reflect a data-driven, accurate, single view of the customer.

ad hoc reporting tools

Puts users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters

audits

Real-time monitoring of usage: announced and surprise

virtual desktops

Running an instance of a PC's software on another machine and delivering the image of what is executing to the remote device

SEO

Search Engine Optimization. The process of improving a page's organic page rankings (rank in search results).

infrastructure backbone

Server farms provide the -- to SaaS and hardware cloud efforts, as well as many large-scale Internet services.

SDK

Software Development Kit. Tools that allow the creation of products or add-ons for a specific operating system or other computing platform.

application server

Software that houses and serves business logic for use (and reuse) by multiple applications.

Open Source Software (OSS)

Software that is free and where anyone can look at and potentially modify the code.

patches

Software updates that plug existing holes

computer hardware and software

TPS consist of -- hosting a transaction-oriented application that performs the routine transactions necessary to conduct business

worms

Take advantage of security vulnerability to automatically spread

virtualization

Technology that can make a single computer behave like many separate computers

voice-print

Technology that identifies users via unique characteristics in speech.

roll back

The ability to revert a wiki page to a prior version. This is useful for restoring earlier work in the event of a posting error, inaccuracy, or vandalism.

Online Reputation Management

The process of tracking and responding to online mentions of a product, organization, or individual. Services supporting online reputation management range from free Google Alerts to more sophisticated services that blend computer-based and human monitoring of multiple media channels.

collaborative consumption

When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., ZipCar) or provided by a community that pools available resources (e.g., Airbnb, Uber).

transaction

a -- is an elementary activity conducted during business operations

loyalty card

a card issued by a shop to allow customers to save money on the basis of what they spend

data lake

a catch-all term for storage and access technologies used in Big Data

data warehouse

a central repository for data from various functional areas of the organization that are stored and inventoried on a centralized computer system so that the information can be shared across all functional departments of the business

big data

a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

blog rolls

a list of a blogger's favorite blogs

dynamic pricing

a pricing strategy in which the price can easily be adjusted to meet changes in the marketplace

R

a programming language specifically created for analytics, statistical, and graphical computing

viral campaign

a promotion in which a few online mentions produce millions of comments

honeypots

false targets for computer criminals to attack

strategic advantages

firms need to think about the -- that can be created with CC

data storage plans

firms should account for e-discovery in its archiving an d-- as data is often complex because of the sheer volume of electronic data produced and stored

dynamic pricing

flexible prices based on market demands

emerging threats, updating, governance

functions of research and development- understanding - and - security techniques, working on broader - issues

python

general purpose programming language

type 2

hardware, OS, hypervisor, OS

User, Operating System, Hardware

hardware/software layer cake

viruses

infect other software or files

platform independence

java is meant to provide

immediate/unfiltered publication, ease of use, comments, reverse chronology, persistence, search ability, tags

key features of blogs

Compliance Requirements

legal or professionally binding steps that must be taken

trackbacks

links in a blog post that refer readers back to cited sources

artificial intelligence

machine learning is an application of --

operating systems

make it easier for user/computer interaction and make it easier to write application software

shallowfakes

manipulating media without using artificial intelligence

viruses, worms, trojans

methods of infection

usage-based, monthly subscription

money can be earned through SaaS via a -- pricing model similar to a --

NOT

most transactional databases are -- set up to be simultaneously accessed for reporting and analysis

lock in

network effects and switching costs can offer a degree of customer preference and --

on-line mode, batch mode

types of TPS

inbound marketing

refers to leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion such as advertising, e-mail marketing, traditional mailings, and sales calls

Change Management

refers to the many techniques used to bring about successful change in a business

white hat hacker

uncover computer weaknesses without exploiting them

human interaction

social engineering relies heavily on

database management system

software for creating, maintaining, and manipulating data

operating system

software that controls the computer hardware

applications

software that houses business logic for use by multiple --

independent tool

software/hardware -- for storing and translating data

XML

software/hardware independent tool for storing and translating data

openly shared

source code for OSS products is --

business intelligence

systems that use data created by other systems to provide reporting and analysis for organizational decision making

education, audit, and enforcement

taking action as an organization: -,-,-

frameworks, standards, and compliance

taking action as an organization: follow ---

push-button hacking

tech threat, Tools designed to easily automate attacks

poorly designed

tech threat: Compromising --software

EDI

the computer-to-computer exchange of business documents from a retailer to a vendor and back

marginal cost

the cost of producing one more unit of a good

cloud computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

data

the raw collection of unrelated facts that don't necessarily have any context


Kaugnay na mga set ng pag-aaral

Marine Science Final Exam: Finding Nemo

View Set

My Best Buy Credit and Visa Card/Rewards Program

View Set

4.9 14 CFR Part 91: 91.3 - 91.151

View Set