MIS Final Study Guide
Loyalty Card
A _____ is a marketing effort by a firm that is targeted at extracting information about an individual customer that might help the firm keep the customer faithful and satisfied.
Row
A horizontal set of data or components. In a graph, it is called the "x-axis." Contrast with column
Zero Day Exploits
A type of advanced cyber attack, finds a backdoor into a program and exploits it and steals small amounts of information that the company wouldnt know what even hit them
Field
In a database, _____ represent each category of data contained in a record
Linux (Created by)
Linus Torvalds created
Business Intelligence Systems
Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____
Advantage of using OSS
You can modify and share code
Point-of-sale systems
_____ are critical for capturing sales data, and are usually linked to inventory systems to subtract out any sold items.
Contract manufacturing
_____ involves outsourcing production to third-party firms.
Enterprise Resource Planning
_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.
Network Effects
a phenomenon whereby a product or service gains additional value as more people use it.
data warehouse
a set of databases designed to support decision making in an organization. It is structured for fast online queries and exploration.
Record
a single instance of whatever the table keeps track of.
ad hoc reporting tools
allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly.
Scalability
allows a firm to scale from start-up to blue chip without having to significantly rewrite their code, potentially saving big on software development costs.
RFID tags
are small chip-based tags that wirelessly emit a unique identifying code for the item that they are attached to.
Dashboards
provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics.
Canned Reports
provide regular summaries of information in a predetermined format. They're often developed by information systems staff and formats can be difficult to alter.
Customer Lifetime Value
represents the present value of the likely future income stream generated by an individual purchaser.
Application Software
software focuses on the work of a user or an organization.
Zara is susceptible to any disruption in northern Spain because:
it moves all of its deliveries through just two locations, both in Spain.
Software as a Service (SaaS)
software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. typically accessed by users using a thin client via a web browser.
Open Source Software
something people can modify and share because its design is publicly accessible.
Supply Chain Management
systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products and services at the point-of-consumption
Total Cost of Ownership (TCO)
systems that can include software development and documentation, or the purchase price and ongoing license and support fees, plus configuration, testing, deployment, maintenance, support, training, compliance auditing, security, backup, and provisions for disaster recovery.
Customer Relationship Management
systems used to support customer-related sales and marketing activities
black hat hackers
the bad guys. Some call them "crackers." There's even a well-known series of hacker conventions known as the Black Hat conference.
white hat hackers
the good guys who probe for weaknesses, but don't exploit them.
Cloud Computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Data mining
the process of using computers to identify hidden patterns and to build models from large data sets.
Contract manufacturers are widely criticized because:
they often employ child labor.
vertical integration
when a single firm owns several layers in its value chain.
Data Cube
which take data from standard relational databases, calculating and summarizing data for superfast reporting access. OLAP tools can present results through multidimensional graphs, or via spreadsheet-style cross-tab reports.
vertically integrated
.As the world's largest chain of coffee houses, Starbucks sources most of its raw materials such as coffee beans and vegetables from suppliers owned by it. It also holds equal or majority stakes in most of the foreign direct investment it carries out in other countries to set up franchisee coffee shops. Based on this information, Starbucks can be said to be
Types of Cyber Criminals
Account theft and illegal funds transfer, Stealing personal or financial data,Compromising computing assets for use in other crimes,Extortion,Espionage,Cyberwarfare,Terrorism,Pranksters, Protest hacking (hacktivism), Revenge (disgruntled employees)
information
Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.
Ways to steal information
Extortion, espionage
High-end fashion house Prada's experiment of implementing the latest technology in its flagship store failed because
Prada assumed information systems are made up of only hardware and software.
Compiling
convert into a machine-code or lower-level form in which the program can be executed.
Data
The term _____ is used to refer to raw facts and figures.
Why Do tech Projects Fail
Unrealistic or unclear project goals, Poor project leadership and weak executive commitment , Inaccurate estimates of needed resources, Badly defined system requirements and allowing "feature creep" during development, Poor reporting of the project's status, Poor communication among customers, developers, and users , Use of immature technology, Unmanaged risks , Inability to handle the project's complexity, Sloppy development and testing practices, Poor project management, Stakeholder politics, Commercial pressures (e.g., leaving inadequate time or encouraging, corner-cutting) are all examples why.....
Over Engineering
When you start to assume things based of traits until you gain the knowledge to prove it or debunkit
It Project Outsourcing
Whether or not you want to do things your self or have other do it for you.
cybercrook
deliberately hops through several systems to make his path difficult to follow, slowing cross-border legal pursuit or even thwarting prosecution if launched from nations without extradition agreements.
Operating Systems
designed to create a platform so that programmers can write additional applications, allowing the computer to do even more useful things.
Black Swans
high-impact events
The PDAs used by Zara staff are linked to the store's point-of-sale system which shows:
how garments rank by sales
Debugging
identify and remove errors from computer software or hardware
Benefits enjoyed by SaaSvendors
improved system customization options and integration with standard software packages. And at times a lack of complexity can be a blessing—fewer choices can mean less training, faster start-up time, and lower costs associated with system use. But firms with unique needs may find SaaS restrictive.
Data mart
is a database focused on addressing the concerns of a specific problem
Relational DB
multiple tables are related based on common keys
Legacy systems
outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs.
Types of Malicious Code
phishing, botnets, trojan horses, spyware adware, worms, rootkit, scare ware, are all examples of..