ISM3011 Test 1 Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Automation

is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs

A(n) _____, a memory device, uses laser beams to access and store data.

optical disc

In the context of storage devices, CD-ROMs and DVDs are examples of _____.

optical discs

Buyer Power

the ability of buyers to affect the price they must pay for an item

Chapter 2

...

the measurement of memory such as the relationship between TB and GB?

1 TB = 1,024 GB

What five forces determine industry structure?

1. Bargaining power of customers 2. Threat of substitutions 3. Bargaining power of suppliers 4. Threat of new entrants 5. Rivalry

A petabyte is equal to _____ bytes.

250

The word computer consists of 64 bits, which is equivalent to _____ bytes.

8

How many bits make up a byte?

8 bits

what are the five principals of competitive strategies?

??

Which is an example of an input device?

A barcode reader

Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

A biometric security measure

Why must business professionals understand how MIS supports decision-making and problem-solving

A company will not have a future if it is not cultivating strategies for tomorrow and this will not be possible to do so unless they are using MIS to quickly review information data in the lake with the massive volumes of info available managers are challenged to make highly complex decisions in short time frames and therefore MIS is required.

Internet

A massive network that connects computers globally and allows them to communicate with each other

Why would a company want a CIO, CPO, and CSO?

All deal with MIS but a chief information officer (CIO) is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives. A chief privacy officer (CPO) is responsible for ensuring the ethical and legal use of information within a company. A chief security officer (CSO) is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses. All help with the businesses needs for management information systems.

Web Browser

Allows access to the WWW

Intranet

An example is MyUWF, only available to certain groups of people, for collaboration

What is artificial intelligence

Artificial intelligence stimulates human thinking and behavior such as the ability to learn and read.mimics human intelligence.

industry-wide differentiation

Better product/service across the industry

Focus Differentiation

Better product/service within an industry segment

Difference between information technology and information systems

Cannot buy an IS but can buy an IT

_____, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.

Cloud storage

Code vs Cipher

Code replaces words Ciphers replace individual letters

Abilities associated with digital dashboard

Consolidation of the data, drill down, slice n dice, pivot.

1st Wave of E-commerce

Coincides with web 1.0. Primarily based in the U.S., English dominant, very slow.

_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.

Computer literacy

_____ can be described as using an organization's database of customers and potential customers in order to promote products or services that an organization offers.

Database marketing

Policy Enforcement

Dissemination Review Comprehension Compliance Uniform enforcement

What is automation

Do you computerization of manual tasks making them more efficient and effective while lowering operational tasks.

Direct-to-Consumer (DTC)

Ebusiness model where companies function independently, cutting out retailers and traditional stores

What are the five artificial intelligence systems

Expert (chess), neural networks (checking for fraud), genetic algorithms (trading decisions), intelligent, virtual reality (working virtually around world).

Define expert systems and describe the role they play in a business.

Expert systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. They include a knowledge base containing various accumulated experience and a set of rules for applying the knowledge base to each particular situation. They are important in the business setting because they fill the gap when human experts are difficult to find or retain or are too expensive,

A byte is a single value of 0 or 1.

False

Labor and population statistics are examples of sources for internal data that are accessed by a database.

False

A comprehensive framework called the ____ was created by Harvard Business School's Michael Porter for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive.

Five Forces Model

Information Ethics

Govern the ethical and moral issues arising from the use of information technologies

What kind of computing promotes a sustainable environment and consumes the least amount of energy?

Green computing

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

Green computing

What are the five-component framework of MIS, and major attributes and examples of these five components

Hardware, software, data, procedures, people.

HTML

Hypertext markup language

_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

Keystroke loggers

User-contributed Content

In the web 2.0, many people create content for the consumption of many other people

Which can help offset the digital divide?

Increasing the number of computers in public places

What is an as is model

It represents the current state of the operation that has been mapped without specific improvements

What is a to B model

It shows how a problem will be solved/implemented. It is the improvements to an as is model.

How can a company use Porter's value chain analysis to measure customer satisfaction?

It views a firm as a series of business processes that each add value to the product or service. The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a cost advantage or product differentiation.

Industry-wide cost

Lowest cost across the industry

Focus Cost

Lowest cost within an industry segment

Mosaic

Marc Andreesen created it and Netscape and sold to Microsoft. Mosaic eventually became internet explorer

Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?

Net neutrality

In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.

OR operator

Digital Darwinism

Organizations which cannot adapt to new demands are destined to go extinct

Pirated vs. Counterfeit Software

Pirated software is an unauthorized copy. Counterfeit software is created to imitate the real thing.

Policy vs Law

Policy is the domain of business Law is the domain of the government

Sustaining Technology

Produces an improved product (intel processing chips are an example, they are continually improved, but they don't ever go away, it's just new models)

What is data and why is it important to a business?

Raw facts that describe the characteristics of an event or object. Sales numbers for example.

Structure of the Web

Search engines drag and catch the top 1% of information (think of a fishing boat using shallow nets). Below the 1% of information that search engines collect are databases and academic journals. Further below (and the most inaccessible place on the web for most people) is Tor, or the dark web.

_____ holds data when the computer is off or during the course of a program's operation.

Secondary memory

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

Spyware

_____ means saving data in computer memory.

Storage

_____, also known as virtual work, has enabled some people to perform their jobs from home.

Telecommuting

Web 1.0

Term to refer to the WWW during the period 1991-2003

What is a business process reengineering

The analysis and redesign of workflow with in and between Enterprises

Recommendation Engine

a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products

Prejudice Bias

a result of training data that is influenced by cultural or other stereotypes

Machine Learning

a type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn

Snapshot

a view of data at a particular moment in time

To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____.

acceptable use policy

Primary Value Activities

acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services

Operational Decisions

affect how the firm is run from day to day, they're the domain of operations managers, who are the closets to the customer

Genetic Algorithm

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

Spoofing happens when:

an illegitimate program poses as a legitimate one.

Porter's Five Forces Model

analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry

Structured Decisions

arise when established processes offer potential solutions

customer service

assisting customers' use of the products and thus maintaining and enhancing the products' value. example: service customers

Business Process Improvement

attempts to understand and measure the current process and make performance improvement accordingly

In a relational database model, the columns are called _____.

attributes

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

back-end systems

To minimize the invasion of privacy, organizations should:

collect only the data that is necessary for the stated purpose.

E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

cookies

key differences between collaboration and cooperation

cooperation is a group of people working together, all doing essentially the same type of work, to accomplish a job, but a collaboration is a group of people working together to achieve a common goal via a process of feedback and iteration

collaboration tools for asynchronous

email discussion forums team surveys

Operational Level

employees develop, control, and maintain core business activities required to run the day-to-day operations

Data Scientists

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

A ____ is typically used to support decisions related to managing an organization's cash flows.

financial information system

threat of new entrants

force strength medium

Structured Data

has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address

Knowledge Facilitators

help harness the wealth of knowledge in the organization

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

illegal and unethical

Streamlining

improves business process efficiencies by simplifying or eliminating unnecessary steps

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

in spear phishing, the attack is targeted toward a specific person or a group.

Support Value Activities

include firm infrastructure, human resource management, technology development, and procurement

Machine-Generated Unstructured Data

includes satellite images, scientific atmosphere data, and radar data

Business-Facing Processes / Back-Office Processes

invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources

Rivalry Among Existing Competitiors

is high when competition is fierce in a market and low when competitors are more complacent

what is mobile systems and why is it important?

it is information systems that support users in motion. mobile systems have major impact on business and society today, an impact forcing industry change while creating new career opportunities for mobile -IS- savvy pros and large numbers of new, interesting mobile-IS- related to jobs.

A(n) _____ is a common output device for soft copy.

liquid crystal display

Goods

material items or products that customers will buy to satisfy a want or need

Algorithms

mathematical formulas placed in software that performs an analysis on a dataset

Effectiveness MIS Metrics

measure the impact MIS has on business processes and activities, including customers satisfaction and customer conversion rates

Efficiency MIS Metrics

measure the performance of MIS itself, such as throughput, transaction speed, and system availability

native applications vs. web applications

native are programs that are written to use a particular operating system and web is designed to run within a computer browser such as chrome, opera, or edge.

Unstructured Data

no defined and does not follow a specific format and is typically free-form text such as emails, Twitters tweets, and text messages

Bottlenecks

occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations

Unstructured Decisions

occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice

First-Mover Advantage

occurs when a company can significantly increase its market share by being first with a new competitive advantage

Chief Sustainability Officer

oversees the corporation's "environmental" programs such as helping adapt to climate change and reducing carbon emissions

Chief Knowledge Officer (CKO)

responsible for collecting, maintaining, and distributing the organization's knowledge

difference between structured decisions and unstructured decisions

structured is one for which there is an understood and accepted method for making the decision and unstructured is one for which there is no agreed-on decision-making method.

What are the differences of synchronous and asynchronous communications?

synch occurs when all team members meet at the same time, such as with conference calls or face to face meetings. Asynchronous occurs when team members do not meet at the same time.

Hardware

the computer, storage disk, keyboard, and monitor

Machine Vision Resolution

the extent to which a machine can differentiate between objects

Knowledge Assets / Intellectual Capital

the human, structural, and recorded resources available to the organizatoin

Online Analytical Processing (OLAP)

the manipulation of information to create business intelligence in support of strategic decision making

What is cloud computing?

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Data Mining

the process of analyzing data to extract information not offered by the raw data alone

Data Profiling

the process of collecting statistics and information about data in an existing source

Competitive Intelligence

the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

Market Share

the proportion of the market that a firm captures

Thin Client vs Thick Client

thick is native apps and thin is web apps.

Information Age

when infinite quantities of facts are widely available to anyone who can use a computer

people

you

Metcalfe's Law

A network's worth is based on the number of users

Disruptive Technology

A new way of doing things that initially doesn't meet demands but eventually opens a new market and destroys the old one

What is a business process

A standardized set of activities that accomplishes a specific task. This helps managers to envision how a business works.

Define transaction processing systems and describe the role they play in a business.

A transaction processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions. A good example is an order entry system. It helps when entering orders because it shows operational functions.

_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.

Integrity rules

_____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.

Normalization

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

True

The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.

True

Viruses can be transmitted through a network or through e-mail attachments.

True

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

True

With employee-monitoring systems, managers can supervise employees' work speeds.

True

In the context of the major components of an information system, which is a difference between information and data?

Unlike data, information consists of facts that have been analyzed by the process component.

Sparkline

a small embedded line graph that illustrates a single trend. often used in reports, presentations, dashboards, and scoreboards. they don't include axes or labels; context comes from the related content

Executive Information System (EIS)

a specialized DSS that supports senior-level executive and unstructured, long-term, nonroutine decisions requiring judgement, evaluation, and insight

Business Process

a standardized set of activities that accomplish a specific tasks, such as processing a customer's orders

Prediction

a statement about what will happen or might happen in the futuer

A(n) _____ is a type of server that stores computer software, which users can access from their workstations.

application server

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

backdoor

Benmarks

baseline values the system seeks to attain

Dynamic Process

continuously changing and provides business solution to ever-changing business operations

Switching Costs

costs that make customers reluctant to switch to another product or service

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

create, read, update, and delete

Machine-Generated Data

created by a machine without human intervention. includes sensor data, point-of-sale data, and web log data

Static Report

created once based on data that does not change

Chief User Experience Officer

creates the optimal relationship between user and technology

Users need to be able to make use of _____, such as rumors, unconfirmed reports, and stories, when solving problems.

informal information

Business Intelligence (BI)

information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patters, trends, and relationships for strategic decision making

Feedback

information that returns to its original transmitter and modifies the transmitter's actions

major tasks of "doing"

perform project tasks. manage tasks and budget. solve problems. reschedule tasks, as necessary. document and report progress.

examples of version control software

permission-limited activity, document checkout, version history, workflow control

Decisions related to scheduling and assigning employees can be supported by a _____.

personnel information system

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

pharming

what is the differences between source code and machine code?

source code is computer code as written by humans and understandable by humans. machine code is not understandable by humans and cannot be modified

In the context of information privacy, junk e-mail is also known as _____.

spam

What are the traits of an effective collaborator

speaks his or her mind even if its an unpopular viewpoint. is willing to enter into difficult convos. is skillful at giving/receiving neg. feedback. is willing to put forward unpopular ideas. thinks diff. than I do/brings different perspectives.

What are the four stages of project management?

starting, planning, doing, finalizing.

Operational Business Processes

static, routine, daily business processes such as inventory stocking, customer checkout, or daily opening and closing processes

Data Democratization

the ability for data to be collected, analyzed, and accessible to all users

Machine Vision

the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action

Machine Vision Sensitivity

the ability of machine to see in dim light or to detect weak impulses an invisible wavelengths

Business Process Modeling / Mapping

the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence

Business Process Reengineering (BPR)

the analysis and redesign of workflow within and between enterprises

Digitization

the automation of existing manual and paper-based processes and workflows to a digital format

Transaction Processing System (TPS)

the basic business system that serves the operational level (analysts) and assists in making structured decisions

Online Transaction Processing (OLTP)

the capture of transaction and event information using technology to process the information according to defined business rules, store the information, and update existing information to reflect the new information

Key Performance Indicators (KPIs)

the quantifiable metrics a company uses to evaluate progress toward critical success factors, are far more specific than CSFs

Productvitivy

the rate at which goods and services are produced based on total output giving total inputs

Analytics

the science of fact-based decision making

Business Analytics

the scientific process of transforming data into insight for making better decisions

What is competitive strategy?

the strategy an organization chooses as the way it will succeed in its industry. Includes cost leadership across an industry or within a particular industry segment and product or service differentiation across an industry or within a particular industry segment

Supplier Power

the suppliers' ability to influence the prices they charge for suppliers (including materials, labor, and services)

Cycle Time

the time required to process an order

Reinforcement Learning

the training of machine learning models to make a sequence of decisions

Robotic Process Automation (RPA)

the use of software with AI and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform

Augmented Reality

the viewing of the physical world with computer-generated layers of information added to it

data

the words, sentences, and paragraphs in your report

Semistructured Decisions

they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision

The main difference between an intranet and the Internet is that intranets are public and the Internet is private.

False

Autonomous Robotics

a robot capable of making its own decisions and perform an action accordingly

Business Unit

a segment of a company representing a specific business function

Model

a simplified representation or abstraction of reality

The data _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.

manipulation

What is open source software?

software available to the public

Identify an advantage of a mouse over a trackball.

A mouse is more precise in positioning the pointer than a trackball.

What are porters 3 generic strategies and why would a company only follow one?

1. Broad cost leadership 2. Broad differentiation 3. Focused strategy. Trying to be all things to all people would be a disaster, since doing so makes it difficult to project a consistent image to the entire marketplace.

What is a business process model

A graphic description of a process showing the sequence of process tasks which is developed for specific purposes from a specific view point.

When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.

AND operator

_____ is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.

Adware

_____ is an example of a secondary memory device.

An optical disc

What is artificial intelligence? What are the five types of AI systems? What applications of AI offer the greatest business value?

Artificial intelligence simulates human thinking and behavior such as the ability to reason and learn. It's ultimate goal is to build a system that can mimic human intelligence. The 5 types of artificial intelligence are Expert systems, neural networks, genetic algorithms, intelligent agents, and virtual reality. Expert systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Typically, they include a knowledge base containing various accumulated experience and a set of rules for applying the knowledge base to each particular situation. Neural networks are also called an artificial neural network. It attempts to emulate the way the human brain works. They analyze large amounts of information to establish patterns and characteristics in situations where the logic or rules are unknown. They learn and adjust to new circumstances on thir own, lend themselves to massive parallel processing, function without complete or well structured information, cope with huge volumes of information with many dependent variables, and analyze nonlinear relationships in information (they have been called fancy regression analysis systems). Insurance companies use these neural networks to help identify fraud. Genetic algorithms are systems that mimic the evolutionary survival of the fittest process to generate increasingly better solutions to a problem. It's an optimizing system it finds the combination of inputs that give the best outputs. These are best suited for situations where there are millions of possible solutions. For example investment companies use these to help in trading decisions. Intelligent agents are special purpose knowledge based information systems that accomplish specific tasks on behalf of it's users. Intelligent agents usually have a graphical representation such as "Sherlock Holmes" for an information search agent. The best example of an intelligent agent is a shopping bot that goes to competitors' websites to find pricings. Virtual reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world. It was built to build more natural, realistic, multisensory human-computer interfaces. It enables tele-presence anywhere in the world where someone can do something in once place and end up doing it in another. Best example is remote access surgery. Expert systems provide the greatest value because they are programmed to find solutions that an expert would have. It is better than having an expert on hand (which is expensive) and this is available whenever it is needed.

Why is it important for a business major to understand MIS?

As a business major chances are we will at some point be in a position where we will need to make decisions for a company (possibly out own) and management information systems are there to help in making data driven decisions, which are the best decisions to be made.

_____ uses a public key known to everyone and a private key known only to the recipient.

Asymmetric encryption

Symmetric vs Asymmetric Encryption

Asymmetric is computationally difficult, but it is easy to distribute and can come with a private key

Crowdsourcing

Asynchronous communication: message + response don't occur at the same time (email) Synchronous communication: message + response happen at the same time (IM, DM, PM, etc.)

Why is it important for a company to operate cross-functionally?

Because decisions being made in one department will surely have an impact on another department. Each department has it's own focus and data, none can work independently if the company is to operate as a whole. All departments must work together as a single unit sharing common information and not operate independently or in a silo.

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

Business continuity planning

What is a business process and what role does it play in an organization?

Business facing processes are also called back office processes, they are invisible to the external customer but essential to the effective management of the business. They include goal setting, day to day planning, giving performance feedback and rewards, and allocating resources. In business processes there is also customer facing processes or front office processes. This results in a product or service received by an organization's external customer. They include fulfilling orders, communicating with customers, and sending out bills and marketing information.

How can a manager use automation, streamlining, and business process re engineering to gain operational efficiency and effectiveness.

Business process improvement attempts to understand and measure the current process and make performance improvements accordingly, which obviously will improve operational effectiveness and efficiency. Automation is the process of computerizing manual tasks. This then makes those tasks more effective, efficient and, lowers operating costs. This improves operational effectiveness and efficiency dramatically. Streamlining improves business process efficiencies by simplifying or eliminating unnecessary steps.

Explain Porter's Five Forces Model and the role it plays in decision making.

Buyer Power, Supplier Power, Threat of Substitute Products or Services, Threat of New Entrants, and Rivalry among existing competitors make up the Five Forces model. Buyer power is the ability of buyers to affect the price they must pay for an item. Supplier power is the suppliers ability to influence the prices they charge for supplies. Threat of substitute products or services in high when there are many alternatives to a product or service and low when there are few alternatives from which to choose. Threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant barriers to joining a market. Rivalry among existing competitors is high when competition is fierce in a market and low when competitors are more complacent.

Production

the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services

What does a manager need to know about computer hardware? such as CPU and its functions, attributes, and measurement, examples of storage hardware, main memory

CPU is the "brain" of the computer. It selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. storage hardware is used to save data and programs. main memory is memory that works in conjunction with the CPU. stores data and instructions.

_____ is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.

Computer-aided design software

Which is a commonly used technology for data collection?

Cookies

Copyright vs Patent vs Intellectual Property

Copyright protects an idea (song, video game, etc.) Patent protects inventions (pens, tractors, cars, etc.) Intellectual property is the special process of creating/doing something (the specific process to bake a cake or temper glass or....)

What is the difference between a customer facing processes and business facing processes

Customer facing processes result in a product or service received by an organizations external customers while business facing processes are invisible to external customers but essential to management

What is the relationship between data, information, business intelligence, and knowledge?

Data is just raw facts to describe the characteristics of an even or object. Information is data converted into a meaningful and useful context. Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making. Knowledge includes the skills, experience, and expertise, coupled with information and intelligence that creates a persons intellectual resources. Knowledge workers use business intelligence with personal experience to make decisions based on both information and intuition and are a valuable resource for any company.

Define decision support systems and describe the role they play in a business.

Decision support systems provide assistance in evaluation and choosing among different courses of action. It allows high-level managers to examine and manipulate large amounts of detailed data from different internal and external sources. It takes in data from multiple sources all over the place but a good example is when a doctor is trying to diagnose a patient will enter symptoms into a support system to help find a diagnosis.

Which decision is supported by a financial information system (FIS)?

Determining porMColio structures

The hardware component of a computer system consists of programs written in computer languages.

False

What are the capabilities associated with digital dashboards?

Digital dashboards support visualization, which tracks KPI's and CSF's by compiling information from multiple sources and tailoring it to meet user needs. They are capable of providing a hot list of key performance indicators, refreshed every 15 minutes. They also provide a running line graph of planned versus actual production for the past 24 hours. They also can provide a table showing the actual versus forcased product prices and inventories. They can provide a list of outstanding alerts and their resolution status. Finally they can graph stock market process. They deliver results quickly and are getting easier to use.

Disinter/Reinter/Cybermediation

Disintermediation - getting rid of the middlemen Reinetermediation - reintroducing a middleman Cybermediation - new intermediates based on e-business

Difference between the ability of a manager to receive information instantly on demand using an MIS or the capabilities provided by a DSS

Dss allows for large amounts of detailed data be examinated from internal and external sources. MIS focuses more on info gathered while DSS focuses on leadership.

Two Kinds of Knowledge

Explicit: can be easily written down and codified, but it is easily forgotten (a sloth's lifespan is around 20 years) Tacit: personal/kinetic knowledge, things you learn how to do (ride a bike)

A logistics information system supports decisions related to providing reports and statistics on employee demographics.

False

A patent protects product names and identifying marks.

False

An effective financial information system should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product.

False

In the context of information systems jobs, a database administrator is responsible for developing an entire information system by writing computer programs.

False

Static Web sites are useful for e-commerce sites that need frequent updates.

False

Four Privacy Invasions

Intrusion - spying Appropriation - identity theft False Light - insinuating something was done "under-table" without documentation Disclosure of Private Fact - leaking

Explain systems thinking and how it supports business operations.

Is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part. It supports business operations because it lets the business react to feedback (positively or negatively)

In the context of using information technologies for a competitive advantage, which statement is true of a top-line strategy?

It focuses on generating new revenue by offering new products and services.

Explain MIS and the role it plays in a company and global business.

It is a business function like accounting or HR, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. MIS incorporates systems thinking to help companies operate cross functionally. It is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively.

Which statement is true of an intranet?

It is a network within an organization that uses Internet protocols and technologies.

Which best defines an operating system (OS)?

It is a set of programs for controlling and managing computer hardware and software.

Which of the following statements is true of a worm?

It is an independent program that can spread itself without attaching itself to a host program.

Do you agree MIS is essential for businesses operating in the information age? Why or why not?

It is essential because data can be used and refined into information and with business intelligence can be used by knowledgeable individuals to make good decisions for a company.

Which statement best describes spyware?

It is software that secretly gathers information about users while they browse the Web.

Why do managers need to understand business processes? Can you make a correlation between systems thinking and business processes?

Managers need to understand business processes because if they are to make decisions they should really know both the customer facing processes and the business facing processes. Reason being, the decisions they make in the company will have an impact on one or both of these processes and any change could be good or bad and the options need to be weighed. The best example of a correlation is when a company is adopting new CRM software. When a company does this they are changing their business facing policy because they have new software to work with and it changes the way they gather information from a customer. It changes the customer facing processes because the goal of the software is to service the customer more effectively.

Interactivity

Measures indicating marketing effectiveness

What is the relationship between critical success factors and key performance indicators? how can a manager use them to understand business operations?

Metrics are measurements that evaluate results to determine whether a project is meeting it's goals. critical success factors are the crucial steps companies used to perform at their goals/objectives and implement their strategies while key performance indicators are the quantifiable metrics a company uses to evaluate progress towards critical success factors. Key performance indicators are far more specific than critical success factors it is important to understand these metrics, critical success factors are elements crucial for a business strategy a success and koi measures the progress with quantifiable measurements.

Mutation

the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome

Web 2.0

Next generation of internet use (our modern internet). Free

Computer Security

Protection afforded AUTOMATED systems to preserve the integrity, availability, and confidentiality of information system resources

Information Security

Protection of information from accidental or purposeful misuse

Which decision is supported by a logistics information system (LIS)?

Selecting the best modes of transportation

Personally Identifiable Information (PII)

Sensitive - SSN, driver's license, financial information, etc. Non-sensitive - zip code, gender, age (when several non-sensitive informations are used together, it can become PII)

First Website

Sir Tim Berners-Lee built it in 1991

_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

The Fair Use Doctrine

What are the three different levels found in a company? What types of decisions are made at each level?

Strategic, managerial, and operational are the different levels found in a company. The strategic level consists of decisions that are unstructured, nonrecurring, and one time. Executives, senior management, and leaders in a company are the ones that make these types of decisions. Managerial level decisions are semi structured and based on unplanned reporting. They are basically there to focus on efficiency and effectiveness and are usually done by middle management and managers, or directors. Operational level decisions are structured, reoccurring, and repetitive. Lower management, department managers, analysts, and staff make them. A good example of operational level decisions is a decision that needed to be made to keep working that day.

World Wide Web (WWW)

Subset of the internet, provides access to information through text, photos, videos

How could a company use loyalty programs to influence buyer power? How could a company use switching costs to lock in customers and suppliers?

Switching costs make customers reluctant to switch to another product or service including financial and intangible values. Loyalty programs reward customers based on their spending, think frequent flyer miles.

Make a correlation between systems thinking and business processes

Systems thinking allows us to differentiate between two business processes. Stratic process is an input that can produce a predicted output whereas dynamic is one that can't.

Explain the difference between customer-facing processes and business-facing processes. Which one is more important to an organization?

The difference between customer facing processes and business facing processes are that customer facing processes are the processes that customers see when doing business with the company while business facing processes involve everything behind the scenes that goes into providing a good or service to a customer. One isn't more important than the other in every instance but in some companies one may be more important than another. For example if a company provides a service for a customer there is most likely going to be a large emphasis on customer facing processes since employees will be doing something for a customer think about technical support for example. Technical support employees need to be able to interact with customers and help those customers find solutions to their problems. In a manufacturing company like an oil refinery they almost never directly interact with customers they are focused mostly on the business processes that encompass oil refining.

What is the difference between the ability of a manager to retrieve information instantly on demand using an MIS and the capabilities provided by a decision support system?

The difference between the ability of a manager to retrieve information instantly on demand using an MIS and the capabilities provided by a DDS are that MIS systems obtain the data that managers require. The information for these requests is structured in advance. In DDS systems the capabilities are much broader. Managers can get information in a number of ways and these systems manage the questions that come up. DDS systems also provide capabilities for a manager to do interactive modeling in order to make informed decisions. It supports semi structured and unstructured decisions faced by individual managers.

What business strategies would you use if you were developing a competitive advantage for a company?

The focused strategy is what I would try to use as a business strategy. This would allow for a more sustainable competitive advantage as opposed to a strategy that competitors could copy later on.

What is Moore's Law?

The number of transistors per square inch on an integrated chip doubles every 18 months

What is streamlining

The process of removing and simplifying unnecessary steps by sorting bottlenecks (resources with full capacities) and therefore improving business process effeciencies.

What is the relationship between critical success factors and key performance indicators? How can a manager use them to understand business operations?

The relationship between critical success factors and key performance indicators are that critical success factors are crucial steps companies perform to achieve their goals and objectives and implement their strategies. Key performance indicators are quantifiable metrics a company uses to evaluate progress towards critical success factors. So basically key performance indicators are metrics that bring a company to critical success factors.

What are the three levels of management found in a company? what type of decisions are made at each level?

The three levels of management found in the company are operational managerial and strategic decisions made at the operational level are structural employees develop control and maintain core business activities to run day today operations decisions made at the managerial level are semi structural employees are continuously evaluating company operations to hone the firms abilities to identify adapt to and leverage change. decisions made at the strategic level are considered

What are the common decision support system analysis techniques?

The ways to analyze decision support systems are the "what if" analysis, sensitivity analysis, goal seeking analysis, and optimization analysis. The "what if" analysis is when the DDS checks the impact of a change in a variable or assumption on the model. What will happen to the supply chain strategy if there is a hurricane here and inventory is reduced? The sensitivity analysis is a special case of what if's is the study of the impact on other variables when one variable is changed repeatedly. It is useful when users are uncertain about the assumptions made in estimating the value of certain key variables. Changing prices in small increments will then allow to see what impact price has on sales. Goal seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output. It is the reverse of what if and sensitivity analysis. Instead of observing how change in a variable affect other variables, goal seeking analysis sets a target value (a goal) for a variable and then repeatedly changes other variables until the target value is achieved. For example a goal seeking analysis could determine how many customers must purchase a new product to increase gross profits to $5 million. Optimization analysis is an extension of goal seeking, here it finds the optimum value for a target variable by repeatedly changing other variables subject to specified constraints. By changing revenue and cost variables in an analysis like this it allows managers to calculate the highest potential profits.

What are transaction processing systems

They are those that are used on one making operational and structured decisions some examples include payroll

Which statement is true of transaction-processing systems?

They focus on data collection and processing.

What are decision support systems

They help to choose different courses of action by compiling information and data

What are expert systems

They imitate the reasoning of experts and certain problems. Hopefully when the experts are too difficult to find or too expensive

Which statement is true of firewalls?

They protect against external access, but they leave networks unprotected from internal intrusions.

Identify a true statement about copyright laws.

They protect tangible material, such as books.

Rivalry among existing competitors is high when many competitors occupy the same marketplace position.

True

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

Trojan programs

A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.

True

According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.

True

An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use.

True

An intrusion detection system (IDS) can protect networks against both external and internal access.

True

Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.

True

Copyright laws cover online materials that can be printed or saved on a storage device.

True

Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.

True

Green computing helps an organization save on energy costs.

True

In a management information system (MIS), the quality of information is determined by its usefulness to users, and its usefulness determines the success of the information system.

True

Common dss analysis

What if, sensitivity (impact on other variable when one is changed), goal seeking (what inputs necessary to meet goal), optimization (extension of goal seeking; changing of variable subject to specified constraints).

Infographic (Information Graphic)

a representation of information in a graphical format designed to make the data easily understandable at a glance

Neural Network / Artificial Neural Netork

a category of AI that attempts to emulate the way the human brain works

Bar Chart

a chart or graphic that presents grouped data with rectangular bars with lengths proportional to the values that they represent

Big Data

a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools

System

a collection of parts that link to achieve a common purpose

Virtual Reality

a computer-simulated environment that can be a simulation of the real world or an imaginary world

Variable

a data characteristic that stands for a value that changes or varies over time

Outlier

a data value that is numerically distant from most of the other data points in a dataset

Competitive Advantage

a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

Entry Barier

a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival

Business Process Model

a graphical description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

Histogram

a graphical display of data using bars of different heights, it's similar to a bar chart, but a histogram groups numbers into ranges

Business Process Model and Notation (BPMN)

a graphical notation that depicts the steps in a business process, provides businesses with a graphical view of the end-to-end flow of their business processes

Time-Series Chart

a graphical representation showing change of a variable over time. used for data that changes continuously. allow for a clear visual representation of a change in one variable over a set amount of time

What is collaboration?

a group of people working together to achieve a common goal via a process of feedback and iteration

Business Strategy

a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services

Fuzzy Logic

a mathematical method of handling imprecise or subjective information

Variance Bias

a mathematical property of an algorithm

Case-Based Reasoning

a method whereby new problems are solved based on the solutions from similar cases solved in the past

What is a value chain?

a network of value-creating activities

Business Process Patent

a patent that protects a specific set of procedures for conducting a particular business activity

Stakeholder

a person or group that has an interest or concern in an organization

What is PC virtualization?

a personal computer that hosts several different operating systems

Sample Bias

a problem with using incorrect training data to train the machine

Benchmarking

a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values) and identifying steps and procedures to improve system performance

Deep Learning

a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets

Cluster Analysis

a technique used to divide an information set into mutually exclusive groups such that the members of each group are so close together as possible to one another and the different groups are as far apart as possible

Project

a temporary activity a company undertakes to create a unique product, service, or result

Pie Chart

a type of graph in which a circle is divided into sectors that each represent a proportion of the whole

Data Mining Tools

a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making

Systems Thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to product outputs while continuously gathering feedback on each part

Google Glass

a wearable computer with an optical head-mounted display (OHMD)

Internet of Things (IoT)

a word where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention

Virtual Workplace

a work environment that is not located in any one physical space

A _____ is a link between devices connected to a computer.

bus

Management Information Systems (MIS)

business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem soving

In the context of storage measurements, a _____ is the size of a character.

byte

The _____ is the heart of a computer.

central processing unit

Dynamic Report

changes automatically during creation

what does a manager need to know about software?

client operating system, server operating system, client application programs, and server application programs.

outbound logistics

collecting, storing, and physically distributing the products to buyers.example: ship drones

How do information systems provide competitive advantages?

competitive advantage via products and via business processes.

Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.

computer

A(n) _____ is the enclosure containing the computer's main components.

computer chassis

What is firmware?

computer software that is installed into devices such as printers, print servers, and various types of communication devices

Expert Systems

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

major implication of Moore's Law

computers are getting exponentially faster. The costs of data processing is approaching zero

Managerial Decisions

concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management

Supply Chain

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product

In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.

cybersquatting

The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.

data

Information

data converted into a meaningful and useful context

The _____ stores data types for fields, default values for fields, and validation rules for data in each field.

data dictionary

The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained.

data model

Human-Generated Data

data that humans, in interaction with computers, generate. Includes input data, clickstream data, or gaming data.

A(n) _____, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.

database

A _____ is software for creating, storing, maintaining, and accessing database files.

database management system

Microsoft Access is an example of a(n) _____.

database management system

In the context of segmentation of customers in database marketing, _____ is a variable that includes gender, age, income, and marital status.

demographic information

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

denial-of-service attack

major tasks of "finalizing"

determine completion. prepare archival documents. disband team.

major tasks of "planning"

determine tasks and dependencies. assign tasks. determine schedule. revise budget.

Chief Automation Officer

determines if a person or business process can be replaced by a robot or software

Estimation Analysis

determines values for an unknown continuous variable behavior or estimated future value

A database administrator (DBA) is responsible for _____.

developing recovery procedures in case data is lost or corrupted

Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.

digital divide

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

disaster recovery plan

A _____ is a peripheral device for recording, storing, and retrieving information.

disk drive

Report

document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

Strategic Business Processes

dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interaction

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

e-wallets

Managerial Level

employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change

Analytical Information

encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions

Transactional Information

encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions

SWOT Analysis

evaluates an organization's STRENGTHS, WEAKNESSES, OPPORTUNITIES, and THREATS to identify significant influences that work for or against business strategies

Market Basket Analysis

evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.

fault-tolerant systems

threat of substitutions

force strength medium

bargaining power of customers

force strength strong

bargaining power of suppliers

force strength weak

rivalry

force strength weak

In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.

foreign key

Porter's Three Generic Strategies

generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service

A data _____ is the structure and organization of data, which involves fields, records, and files.

hierarchy

Java and C++ are examples of _____.

high-level languages

what are the three types of software?

horizontal, vertical, and one-of-a-kind

Knowledge

includes the skills, experience, and expertise, coupled with information and intelligence, that create a person's intellectual resources

Workflow

includes the tasks, activities, and responsibilities required to execute each step in a business process

Human-Generated Unstructured Data

including text messages, social media data, and emails

In the context of using information technologies for a competitive advantage, a top-line strategy focuses on:

increasing revenue by selling existing products to new customers.

Return on Investment (ROI)

indicates the earning power of a project

Knowledge Workers

individuals valued for their ability to interpret and analyze information

sales and marketing

inducing buyers to purchase the products and providing a means for them to do so. example: market and sell drones

Strategic Decisions

involve higher-level issues concerned with the overall direction of the organization; these decisions involve higher-level issues concerned with the overall goals and aspirations for the future

what is business process design and how does it apply to the value chain model?

is a network of activities that generate value by transforming inputs into outputs. It spans the value chain activities.

Threat of New Entrants

is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

Threat of Substitute Products or Services

is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

What is information and the characteristics of good information?

knowledge derived from data. meaningful context. processed data, or data processed by summing, ordering, averaging, grouping, comparing, or similar operations. "a difference that makes a difference"

A(n) _____ is a common output device for hard copy.

laser printer

Swim Lane

layout arranges the steps of a business process into a set of rows depicting the various elements

A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.

legal, but unethical

A ____ is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.

logistics information system

Operationalized Analystics

makes analytics part of a business process

A _____ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

management information system

Strategic Level

managers develop overall business strategies, goals, and objectives as part of the company's strategic plan

Chief Intellectual Property Officer

manages and defends intellectual property, copyrights, and patents

A data _____ is usually a smaller version of a data warehouse, used by a single department or function.

mart

Metics

measurements that evaluate results to determine whether a project is meeting its goals

Decision Support Systems (DSSs)

model information using OLAP, which provides assistance in evaluating and choosing among difference sources of action

Workflow Control Systems

monitor processes to ensure tasks, activities, and responsibilities are executed as specified

Product Differentiation

occurs when a company develops unique differences in its products or services with the intent to influence demand

Underfitting

occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

Overfitting

occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data

Redundancy

occurs when a task or activity is unnecessarily repeated

Data Augmentation

occurs when adding additional training examples by transforming existing examples

Measurement Bias

occurs when there is a problem with the data collected that skews the data in one direction

collaboration tools for synchronous

office applications such as word and power point, shared whiteboards. conference calls multiparty text chat, screen sharing, webinars, videoconferencing

UNIX is a type of _____.

operating system

examples of app programs and operating systems

operating systems: windows, Mac OS, Unix, linux, symbian, blackberry OS, iOS, Android, Windows 10, Windows server, unix server, linux server. App programs: horizontal-market apps, vertical parket apps, one of a kind app.

what are the differences among operational, managerial, and strategic

operational is short term and more structured while managerial and strategic are more unstructured and long term.

Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on.

predictive modeling

In a relational database, every record must be uniquely identified by a _____ key.

primary

Visualization

produces graphical displays of patterns and complex relationships in large amounts of data

A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.

program

Data

raw facts that describe the characteristics of an event or object

inbound logistics

receiving, storing, and disseminating inputs to the products. example: acquire drone parts

What is data and its characteristics?

recorded facts or figures. Accurate, timely, relevant, just barely sufficient, and worth its cost

Machine-to-Machine (M2M)

refers to devices that connect directly to other devices

Granularity

refers to the level of detail in the model or the decision-making process

As-Is Process Models

represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes

Chief Data Officer (CDO)

responsible for determining the types of information the enterprise will capture, retain, analyze, and share

Chief Privacy Officer (CPO)

responsible for ensuring the ethical and legal use of information within an organization

Chief Security Officer (CSO)

responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses

Chief Technology Officer (CTO)

responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology

Customer-Facing Processes / Front-Office Processes

result in a product or service received by an organization's external customer

Affinity Grouping Analysis

reveals the relationship between variables along with the nature and frequency of the relationships

Loyalty Programs

rewards customers based on their spending

Managerial Business Processes

semidynamic, semiroutine, monthly business processes such as resource allocation, sale strategy, or manufacturing process improvemetn

In the context of Web and network privacy, an acceptable use policy is a:

set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

major tasks of "starting"

set team authority. set project scope and initial budget. Form team. Establish team roles, responsibilities, and authorities. establish team rules.

To-Be Process Models

shows the results of applying change improvement opportunities to the current process model

Artificial Intelligence (AI)

simulates human thinking and behavior, such as the ability to reason and learn. ultimate goal is to build a system that can mimic human intelligence

The process of capturing and recording network traffic is referred to as _____.

sniffing

Services

tasks people perform that customers will buy to satisfy a want to need

Fact

the confirmation or validation of an event or object

Critical Success Factors (CSFs)

the crucial steps companies perform to achieve their goals and objectives and implement their strategies

MIS Skills Gap

the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies

procedures

the methods you use to start the program, enter your report, print it, and save and back up your file

Best Practices

the most successful solutions or problem-solving methods that have been developed by a specific organization or industry

Source Documents

the original transaction record

Anomaly Detection

the process of identifying rare or unexpected items or events in a dataset that do not conform to other items in the dataset

Classification Analysis

the process of organizing data into categories or groups for its most effective and efficient use

Data Replication

the process of sharing information to ensure consistency between multiple data sources

Digital Dashboard

tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs

Operations/Manufacturing

transforming inputs into the final products. example: produce drone

To minimize the invasion of privacy, users and organizations should:

use verification procedures to ensure data accuracy.

Unlike data in databases, data in data warehouses is:

used for analytical purposes.

Static Process

uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously

Prescriptive Analystics

uses techniques that create models indicating the best decision to make or course of action to take

Predictive Analytics

uses techniques that extract information from data to predict future trends and identify behavioral patterns

Descriptive Analytics

uses techniques the describe past performance and history

Haptic Interace

uses technology allowing humans to interact with a computer through bodily sensations and movement

what are the version management systems and version control

version management track changes to documents and provide features and functions to accommodate concurrent work and version control is the process that occurs when the collaboration tools limits, and sometimes even directs, user activity.

Value Chain Analysis

views a firm as a series of business processes, each of which adds values to the product or service

A _____ consists of self-propagating program code that is triggered by a specified time or event.

virus

volatile and nonvolatile memory, characteristics of smart devices

volatile is cache and main memory. nonvolatile is magnetic disks, solid state storage, thumb drives.

A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

warehouse

In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.

why the buyer buys a product or service

software

word, wordperfect, or some other word-processing program


Ensembles d'études connexes

ATI_AQ_MED-SURG_Cardiovascular_and_Hematology

View Set

Seleccionar Selecciona la mejor respuesta para cada pregunta según el video clip.

View Set

CAS 50 Chapter 8 Networking & Fiberoptics

View Set

SECTION 2 RENAISSANCE SOCIAL STUDIES QUIZ YO

View Set

Chapter 1: Introduction to Nursing - PrepU

View Set