MIS 301 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What does ETL stand for?

(Extract, Transform, Load) the process of storing of storing data, extracting, transforming, and then loading them into the data warehouse or mart.

What are some of the difficulties in Managing Data? (4)

-Amount increases -Generated from multiple sources -New sources of data -Unique requirement

File Management Era - Challenges (3)

-Independent stuff in multiple spots, can't connect, if needs to be changed, have to change it in the different spots -The way data was managed through the 70's and 90's -Stored in separate files, clunky

In a database environment, what is a primary key?

A field (or group of fields) that uniquely identifies a given record in a table

Each characteristic or quality of a particular entity

Attributes:

Which type of e-commerce involves the exchange of the largest amounts of money?

B2B Business to business

Which type of e-commerce has the most participants/customers?

B2C - Business to Consumer

_______ Comprises the vast majority of e-Commerce by total volume of the transactions

B2C - Business to Consumer

You adopt a child and need to update your healthcare benefits to include that new child. This is an example of

B2E - Business to Employee

A process in which a company identifies certain types of software that are not allowed to run in the company environment

Blacklisting

Organizations in which the product, the process, and the delivery agent are all physical

Bricks-and-Mortar

Organizations that do business in both physical and digital dimensions

Bricks-and-clicks

The _________ business model or organization model are purely physical in their presence and business operations

Bricks-and-mortar

What is the most secure type of system authorization?

Can't be duplicated, facial scans, fingerprints, voice recognition, etc Biometrics, but more levels of authentication add more security Passwords are a huge information security problem, not very secure

A primary key in a relational database that is made up of two or more attributes is called

Composite Key

More than one data field/attribute used to function as a primary key

Composite Key:

Data meets certain constraints

Data Integrity

Applications cannot access data associated with other applications

Data Isolation

Minimizes mistakes and deters attacks

Data Security

A logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks

Data Warehouse

various copies of the data do not agree

Data inconsistency

What type(s) of system is/are non-volatile?

Data warehouses and data marts are nonvolatile-that is users cannot change or update the data

Nike.com selling shoes directly to consumers is an example of

Disintermediation

Any person, place, thing, or event of interest to a user

Entity

In working with or designing a database, "ERD" stands for

Entity Relationship Diagram

a field (or group of fields) in one table that uniquely identifies a row (or record) of another table

Foreign Key:

Which of the following is not an advantage of database-stored information

Increased information redundancy

a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted

Primary Key

What does PAPA stand for?

Privacy, Accuracy, Property, Accessibility

With________, customers use the internet to self-configure products or services

Product customization

Engaged only in E-commerce

Pure Play

You are a musician. You sell your songs only on iTunes. This is an example of

Pure Play

a strategy in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised and compares the probable costs of each being compromised with the costs of protecting it

Risk Analysis

a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels

Risk Management

a strategy in which an organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur

Risk acceptance

In general, _______ is a limitation of e-commerce

Security

Type of IT that combines social behavior and information systems to create value; focused on improving collaboration and interaction among people and on encouraging user-generated content-- answer to a question

Social Computing

a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity

Whitelisting

What is Social Engineering?

getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges


संबंधित स्टडी सेट्स

New Testament Survey Final Exam Part 1

View Set

US History - STAAR Questions - Gurerro Fall Final

View Set

Chapter 22 - Performance and Breach of Sales and Lease Contracts

View Set

OB High Risk Newborn Final Practice Qs

View Set

Το εσωτερικό του Υπολογιστή

View Set

Cellular respiration quizWhich of the following statements describes the results of this reaction?C6H12O6 + 6 O2 --> 6 CO2 + 6 H2O + Energy *

View Set

Chapter 32: Serious mental illness

View Set

تاريخ الفكر الاقتصادي

View Set

Chapter 65: Management of Patients With Oncologic or Degenerative Neurologic Disorders NCLEX

View Set