MIS 2201 Midterm II (UMD)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Categories of data analytics and their goals: predictive

Predictive: -Questions: What will happen and why? -Enables: data mining, text mining, web/media mining, forecasting -Outcomes: accurate projections of the future states and conditions

Describe how organizations should respond to security threats.

Senior management creates company-wide policies: - What sensitive data will be stores? - How will data be processed? - Will data be shared with other organizations? -How can employees and others obtain copies of data stored about them? - How can employees and others request changes to inaccurate data? - Senior management manages risks

Describe how social media sites leverage collective intelligence and resources. Explain crowdsourcing.

crowdsurfing: the act of taking a job traditionally performed by designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call - leveraged by several public markets for innovation and as an alternative to standard means of production - not all crowdsourcing is financially motivated; some benefit by helping to create a better service

What are forms, reports, and queries?

form: data entry forms are used to read, insert, modify, and delete database data report: a presentation of data in a structured, meaningful context query: a request for data from a database

Business applications for data analytics (fraud detection, market analysis, risk management, logistics and operations)

fraud detection: uncovering patterns consistent with criminal activity market analysis: determining which products customers buy together, and how an organization can use this information to cross-sell more products or services risk management: The fundamental elements of risk management are the identification, evaluation, and prioritization of risks, as well as steps taken to minimize the negative aspects of risks, such as monitoring and controlling. logistics and operations: refers to the process of moving finished goods, starting from the manufacturer and moving to the end user

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

Sniffing

technique for intercepting computer communications

Why are database application programs needed?

used to search, sort, calculate, report and share information

Formatting text (e.g. wrapping) and numbers (decimal points) in Excel.

wrap text: in alignment tab, select 'wrap text' specify decimal points: format menu, click 'format cells', number tab, choose number item in category list. Decimal place is in right part of window

Different kinds of functions in Excel (Statistical, Math & Trig, Logical, etc)

- Aggregate: calculate a result, which is an aggregate of the range - Financial: calculate financial information, such as net present value and payments - Statistical: apply a mathematical process to a group of cells in a worksheet - Scientific: trigonometry, logarithms and functions that manipulate numbers - Logical: test the value of a cell and perform different operations on it depending on the outcome - Text: lets you manipulate character data, such as the names of customers, street addresses and product descriptions

Aggregation tools (e.g. RSS)

- Helps people keep abreast of the changes in websites. Web feeds enable users to be alerted when websites have new content - Two formats of Web feed •RSS -- Really Simple Syndication (gets articles, websites, stories from various sources) •Atom - improved on RSS - Examples: Google Reader, Bloglines, Newsgator, Feedzilla

Describe how technical safeguards protect against security threats.

- Identification and authentication - Encryption - Firewalls - Malware protection - Design for secure applications

Using tables to analyze large amounts of data

- Instead of using cell references, such as A1 and R1C1, you can use structured references that reference table names in a formula - You can use the built-in data validation feature in Excel. For example, you may choose to allow only numbers or dates in a column of a table

Explain how one should respond to security threats and practice safe computing

- Take security seriously - Create strong passwords - Use multiple passwords - Send no valuable data via email or IM - Use https at trusted, reputable vendors - Remove high-value assets from computers - Clear browsing history

Wikis

- Web pages that enable users collectively to add and edit content - Many are cost-free for users - Wikipedia describes a wiki as 'software that allows registered users or anyone to collaboratively create, edit, link, and organize the content of a website, usually for reference material - Used in businesses to provide affordable and effective intranets and for Knowledge Management - Key features: all changes are attributed, so others can see who made an edit; revision history is maintained so changes can be compared; automatic notification and monitoring of updates; all pages in a wiki are searchable; tagging system

Q&A Sites

- allows users to ask a question about any subject and receive multiple answers from other users who see it

Social networking sites

- form of user participation in which the goals are to build and maintain social connections for satisfying social, career and personal needs - Compared to traditional sites that focus in a particular area of interest, such as ESPN on sports, social network sites focus on people: the users - Key features: detailed personal profiles; affiliations with groups, individuals, products, and firms/organizations; private messaging and public discussions; media sharing; discovery-fueling feeds of recent activity among members

Blogs

- online journal entries, usually made in reverse chronological order - corporations distribute ideas and gather feedback from public - key features: immediate and unfiltered publication, ease of use, comment threads, reverse chronology, persistence (permanent links), searchability and tags, trackbacks (links in blog post that refer readers back to cited sources)

Microblogging

- short-message blogging, made through a mobile device - Twitter

Workgroup productivity

- social networks have become organizational productivity tools - firms implement their own internal social networks, which are hopefully more secure and tailored to firm needs - these networks have replaced traditional employee directory - importance because many employees work from home/client locations - firms are setting up social networks for customer engagement and mining these sites for customer ideas, innovation, and feedback

Using formulas in Excel; how to enter formulas

- type = sign into cell you want to enter formula into - use formula button to input any type of formula

Why data analytics is a hot topic

-More data has been collected in the past several years than the collection of data in the whole history of mankind before that -Companies realizing that they are sitting on mountains of valuable data -Technology has improved that is enabling easy collection and analysis of valuable data -Enhancement in data analytics techniques

Explain the prevalence of the computer security problem

-No one knows the exact cost of computer crimes -Data loss single most expensive consequence of computer crime -80% of respondents believe data on mobile devices poses significant risks

Describe why DOS or DDOS attacks are difficult to defend against

-sites don't know where the attacks are coming from -firewalls aren't designed to handle DDoS attacks -the defense can't be mounted on the hosting provider's infrastructure

Describe the goal of information systems security

1. Threat - person or organization seeks to obtain data or other assets illegally, without owner's permission and often without owner's knowledge 2. Vulnerability - opportunity for threats to gain access to individual or organizational assets; for example, when you buy online, you provide your credit card data, and as data is transmitted over Internet, it is vulnerable to threats 3. Safeguard - measure individuals or organizations take to block threat from obtaining an asset; not always effective, some threats achieve their goal in spite of safeguards 4. Target - asset desired by threat 5. Risk - The probability of a threat exploiting a vulnerability and the resulting cost. 6. Exploit- Tools or techniques that take advantage of a vulnerability.

Using conditional formatting to highlight values

1. select range of cells 2. click 'conditional formatting' 3. 'highlight cells rules' or 'top/bottom rules'

Messaging

A broad term that refers to any technology that allows users to communicate with each other using text messages.

What is a database management system (DBMS)?

A program used to create, process, and administer a database. Operations: read, insert, modify, delete.

Definition of data and business analytics

Business analytics: the skills, technologies, applications and practices for continuous iterative exploration and investigation of past business performance to gain insight and drive business planning

Definition of artificial intelligence

Computer software that can mimic or improve upon functions that would otherwise require human intelligence.

Using Charts in Excel; Modifying chart elements

Click on chart, and the chart tools tab will display

Describe how data safeguards protect against security threats.

Data safeguards protect databases and other organizational data. Two organizational units are responsible for data safeguards. Data administration refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. When organizations store databases in the cloud, all of the safeguards should be part of the service contract. Trusted party should have a copy of encryption key - called key escrow.

Various names for data analytics (data science, data mining, KDD, etc)

Data science: an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data, and apply knowledge and actionable insights from data across a broad range of application domains Data mining: a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems KDD (Knowledge Discovery in Databases): the broad process of finding knowledge in data, and emphasizes the "high-level" application of particular data mining methods

Categories of data analytics and their goals: descriptive

Descriptive: -Questions: What has/is happening? -Enables: Business reporting, dashboards, scorecards, data warehousing -Outcomes: well-defined business problems and opportunities

Describe how human safeguards protect against security threats

Development of human safeguards for employees. Employees need to be made aware of the security policies, procedures, and responsibilities they will have. Companies must establish security policies and procedures for the termination of employees.

What is spyware and malware and how can we protect against them?

Malware: malicious software designed to gain access to or damage your computer, often without your knowledge Spyware: a type of malware; unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information How to protect against them: -keep your computer and software updated -use a non-administrator account whenever possible -think twice before clicking links or downloading anything -be careful about opening email attachments or images -don't trust pop-up windows -limit file-sharing -use antivirus software

Different data analytic techniques: Market Basket Analysis

Market basket analysis: Identify sales patterns in large volumes of data, Identify what products customers tend to buy together, Computes probabilities of purchases, Identify cross-selling opportunities

Mathematical and Financial formulas (e.g. SUM, MAX, MIN, PMT, etc)

Mathematical formulas: - SUM: adds up all values in the range - AVERAGE: adds up all values in range and divides by number of values - COUNT: adds up number of values in range -MAX: finds largest value in range -MIN: finds smallest value in range Financial formulas: - PMT: denotes the periodical payment required to pay off for a particular period of time with a constant interest rate

What does Web 2.0 have to do with social media?

Much of what was often called Web 2.0 is now categorized as social media

Different data analytic techniques: OLAP

OLAP (Online Analytical Processing): software for performing multidimensional analysis at high speeds on large volumes of data from a data warehouse, data mart, or some other unified, centralized data store

Categories of data analytics and their goals: prescriptive

Prescriptive: -Questions: What should I do and why? -Enables: optimization, simulation, decision modeling, expert systems -Outcomes: best possible business decisions and transactions

Different data analytic techniques: RFM

RFM (recency, frequency, and monetary value): segment customers based on when their last purchase was, how often they've purchased in the past, and how much they've spent overall

Absolute and relative addressing

Relative references change when a formula is copied to another cell. Absolute references remain constant no matter where they are copied.

Different data analytic techniques: reporting

Reporting: Create meaningful information from disparate data sources; Deliver information to user on time; Basic operations: 1.Sorting, 2.Filtering, 3.Grouping, 4.Calculating, 5.Formatting

Logical IF functions

Runs a logical test and returns one value for a TRUE result, and another for a FALSE result - example: pass/fail, pass = score above 70%, fail = score below 70%

Sources of threats to digital security

Unauthorized data disclosure -Human error: procedural mistakes -Computer crime: pretexting, phishing, spoofing, sniffing, hacking Incorrect data modification -Human error: procedural mistakes, incorrect procedures, ineffective accounting -Computer crime: hacking

Using Excel as a database and spreadsheet database functions (VLOOKUP)

VLOOKUP is an Excel function to look up data in a table organized vertically. VLOOKUP supports approximate and exact matching, and wildcards (* ?) for partial matches. Lookup values must appear in the first column of the table passed into VLOOKUP.

File/Video/Photo sharing sites

Youtube, Flickr, Ustream, Voicethread

Spoofing

a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage

What kinds of authentication systems work best?

adaptive multi-factor authentication

What is a database? Definition?

an organized collection of data, generally stored and accessed electronically from a computer system

What is metadata? What is a primary key and what is its role?

data that provides information about other data

What is the definition of social media?

content that is created, shared, and commented on by a broader community of users

Creating data series in Excel

data series: A row or column of numbers that are plotted in a chart is called a data series. You can plot one or more data series in a chart. 1. select range 2. insert tab, column symbol 3. select clustered column

How are data models used for database development?

helps design the database at the conceptual, physical and logical levels. Data Model structure helps to define the relational tables, primary and foreign keys and stored procedures. It provides a clear picture of the base data and can be used by database developers to create a physical database

Data types allowed in Excel

logical values, numerical values, text values, and error types

Categories of Artificial Intelligence

machine learning: Software that contains the ability to learn or improve without being explicitly programmed deep learning: A type of machine learning that uses multiple layers of interconnections among data to identify pattern and improve predicted results neural network: Examines data and hunts down and exposes patterns, in order to build models to exploit findings expert systems: Leverages rules or examples to perform a task in a way that mimics applied human expertise Genetic algorithms: Model building techniques where computers examine many potential solutions to a problem -Modifies various mathematical models that have to be searched for a best alternative.

Working with ranges in Excel, selecting non-adjacent ranges

non-adjacent: hold Ctrl and select additional nonadjacent cell(s)

How to create page breaks in Excel

select 'page break', select the row below where you want to insert the page break (vertical page break) or select the column to the right of where you want to insert the page break (horizontal page break), and click 'insert page break'

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Explain the structure of the database table (byte-column-row)

the hierarchy of data elements (top to bottom) - database - tables (files or relations) - rows (records) - fields - columns - bytes

How do database applications make databases more useful?

they make them more informational and updatable through forms, reports, queries, and application programs

Hacking

unauthorized access, modification, or use of an electronic device or some element of a computer system


Set pelajaran terkait

Name & describe the six essential activities of the digestive tract

View Set

Becoming A World Power Study Guide

View Set

Grade 12 Biology Cellular Respiration

View Set

International Business Chapter 1-4 test

View Set

Intermediate Accounting II - Chapter 18

View Set

Business Management 1 Final Exam Study Guide

View Set

Chapter 28 - Pulling it All Together : Integrated Head-to-Toe Assessment (Final)

View Set

ATI Ch 32 Medications Affecting Labor and Delivery

View Set