MIS 301 Final
What does ETL stand for?
(Extract, Transform, Load) the process of storing of storing data, extracting, transforming, and then loading them into the data warehouse or mart.
What are some of the difficulties in Managing Data? (4)
-Amount increases -Generated from multiple sources -New sources of data -Unique requirement
File Management Era - Challenges (3)
-Independent stuff in multiple spots, can't connect, if needs to be changed, have to change it in the different spots -The way data was managed through the 70's and 90's -Stored in separate files, clunky
In a database environment, what is a primary key?
A field (or group of fields) that uniquely identifies a given record in a table
Each characteristic or quality of a particular entity
Attributes:
Which type of e-commerce involves the exchange of the largest amounts of money?
B2B Business to business
Which type of e-commerce has the most participants/customers?
B2C - Business to Consumer
_______ Comprises the vast majority of e-Commerce by total volume of the transactions
B2C - Business to Consumer
You adopt a child and need to update your healthcare benefits to include that new child. This is an example of
B2E - Business to Employee
A process in which a company identifies certain types of software that are not allowed to run in the company environment
Blacklisting
Organizations in which the product, the process, and the delivery agent are all physical
Bricks-and-Mortar
Organizations that do business in both physical and digital dimensions
Bricks-and-clicks
The _________ business model or organization model are purely physical in their presence and business operations
Bricks-and-mortar
What is the most secure type of system authorization?
Can't be duplicated, facial scans, fingerprints, voice recognition, etc Biometrics, but more levels of authentication add more security Passwords are a huge information security problem, not very secure
A primary key in a relational database that is made up of two or more attributes is called
Composite Key
More than one data field/attribute used to function as a primary key
Composite Key:
Data meets certain constraints
Data Integrity
Applications cannot access data associated with other applications
Data Isolation
Minimizes mistakes and deters attacks
Data Security
A logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks
Data Warehouse
various copies of the data do not agree
Data inconsistency
What type(s) of system is/are non-volatile?
Data warehouses and data marts are nonvolatile-that is users cannot change or update the data
Nike.com selling shoes directly to consumers is an example of
Disintermediation
Any person, place, thing, or event of interest to a user
Entity
In working with or designing a database, "ERD" stands for
Entity Relationship Diagram
a field (or group of fields) in one table that uniquely identifies a row (or record) of another table
Foreign Key:
Which of the following is not an advantage of database-stored information
Increased information redundancy
a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted
Primary Key
What does PAPA stand for?
Privacy, Accuracy, Property, Accessibility
With________, customers use the internet to self-configure products or services
Product customization
Engaged only in E-commerce
Pure Play
You are a musician. You sell your songs only on iTunes. This is an example of
Pure Play
a strategy in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised and compares the probable costs of each being compromised with the costs of protecting it
Risk Analysis
a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels
Risk Management
a strategy in which an organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur
Risk acceptance
In general, _______ is a limitation of e-commerce
Security
Type of IT that combines social behavior and information systems to create value; focused on improving collaboration and interaction among people and on encouraging user-generated content-- answer to a question
Social Computing
a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity
Whitelisting
What is Social Engineering?
getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges