MISM Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

what wireless NIC do?

- Enables roaming laptops to send signals to a Wireless Access Point (WAP) or Wireless routers• - Enables roaming laptops to receive signals from Wireless Access Point (WAP) or Wireless Routers - Converts wireless radio signals sent by WAPs into digital computer signals (and does reverse conversion for outgoing computer messages

what do network interface cards do?

- It enables a PC or other device to have communications functionality - Enables a computer device to be assigned a unique IP address - It receives outgoing data from the CPU and RAM, breaks them into packets and sends them to an appropriate network point/router (it receives all incoming packets and aggregates them and sends them to CPU and RAM) prepares traffic from networks

components of BI systems

- database feeds data to data warehouse systems - data extraction, storage and filtering mechanisms - data manipulation and viewing tools - data mining tools for analysis - data results distribution and administration - reporting tools for information presentation

benefits of reporting systems

- one gets quick summaries of data - one gets quick charts - the applications are easy to learn

disadvantages of reporting systems

- one need many reports to answer questions - no possible way to define relationships between data (data models)

internet servers providing services

- servers that provide web pages (web servers) - servers that provide search functions (search engines) - servers that perform ecom - servers that perform verification services - web hosting srvices - cloud services - email services - social media services

what do reporting systems address

- what has happened in the past - what is the current situation - how does the current situation compare to the past

Advantages of e-commerce

-Enhances relationships with suppliers, customers, business partners -Creates price transparency -Operates around the clock and globe -Gathers more information on potential customers -Increases customer involvement -Improves customer service

second generation improvement: OLAP based approach

1. ETL software used to load data from different sources into warehouse 2. ETL software could be used to load data into application (ad-hoc analysis) 3. Data analysts created mdoels that populated dashboards 4. workers can create their own reports

selected network types

1. Personal area networks (PANs)-connects devices located in an individual's workspace. 2. Local area networks (LANs)-connects computers that reside within a small geographical area (single site), such as on the premises of the company that operates the LAN. 3. Wide area networks (WANs)-connects computers at are located within a wide geographical area (many sites). The Internet is the most widely used WAN. 4. The Internet is a network of networks. One can view it as a connection of hundreds of thousands of WANs. It is a global WAN that is not owned/used by any one company

four advantages of big data technologies in a data cloud

1. flexibility: data lakes can absorb any type of data (structured of not) from any type of source 2. scalability: These systems can start on a single PC, but thousands of machines can eventually be combined to work together for storage and analysis 3. cost effectiveness: May further reduce hardware and management costs. 4. Fault tolerance: Big Data storage is designed in such a way that there will be no single point of failure

why are computer networks important to business?

1. sharing valuable resources and assets 2. lowering IS operating costs 3. overcoming barriers of time, place and organizational boundaries 4. enabling new/better ways to operate, control and innovate

communications over great distance

4G LTE cellular radio waves are used to transmit data over great distances

Star Topology

A LAN configuration in which a central node controls all message traffic - most popular very fast (2 stops)

Bus Topology

A LAN configuration in which all nodes share a common line data stops at every computer (security issue)

client-server LAN

A client/server LAN consists of several devices(the clients) connected to a central server. The server manages file storage, application access, device access, and network traffic.• A client can be any connected device that runs or accesses applications or the Internet.The clients connect to the server either with cables or through wireless connections

SMTP (Simple Mail Transfer Protocol)

A communications protocol that enables sending email from a client to a server or between servers.

TCP (Transmission Control Protocol)

A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network like the Internet.

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet.

country code TLD

A top-level domain that corresponds to a country. For example, the country code TLD for Canada is .ca, and the country code TLD for Japan is .jp.

semi structured decision

Actor must partly undertake judgment, evaluation and apply insight to parts of problem. The decision is partly routine and partly unique. (Middle management decisions)

unstructured decision

Actor must undertake judgment, evaluation and apply insight to problem. The decision is not routine and does not have an agreed procedure for resolution.(Top management decisions

structured decisions

Actor only needs to gain recognition of the issue/problem. The decision is routine, occurs frequently, and does have an agreed procedure for resolution (LowerManagement/Operational staff decisions)

URL

An easy-to-remember address for calling a web page (like www.code.org). uniform resource locator

internationalized domain names

An internationalized domain name (IDN) is an Internet domain name that contains at least one characters that are displayed in software applications, in whole or in part, in a language-specific script or alphabet, such as Arabic, Chinese,Cyrillic, Tamil, Hebrew or the Latin alphabet-based charactes

Information Hierarchy

Data (unstructured symbols and characters), Information (structured data, with who what when), Knowledge (highly structured information) , Wisdom (why act, what makes sense?)

load balancing

Distributing a computing or networking workload across multiple systems to avoid congestion and slow performance.

contrasting technologies

ERP, CRM, BI

EDI

Electronic data interchange: the computer-to-computer exchange of business documents from a retailer to a vendor and back - best to integrate EDI with ERP rather than be stand alone - best to use when exchanging business documents 1. classic EDI approach: connecting 2 ERP systems using EDI (only if you have few suppliers) 2. Web-EDI (connecting ERP's to an intermediary platform EDI so messages can be sent to anyone connected)

Extended ERP components

Extra components that meet the organizational needs not covered by the core components and primarily focus on external operations -business intelligence - customer relationship management - supply chain management - e-com

BI

Focus: products, people and events

HTTP

HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet

IP

Internet Protocol- routing protocol that is in charge of forwarding packets on the internet

Implications of Metcalfe's Law

More digital devices are connected together. The value of digital and social networks is increasing exponentially.

Risks of E-Commerce

Risks to businesses: Pressure to be "always open." Lost business due to customer hesitation to shop online. Risk of fraudulent credit card transactions. Ease of entry for competitors. Risks to customers: Fraud and other potential security problems. Not being able to feel or touch the goods. Possible expense to the customer of returning merchandise. disintermediation: elimination of middle layers in supply chain

Sponsored Generic TLDs

Sponsored TLD is a specialized domain with a sponsor representing the community that the TLD serves, including .edu, .gov, .mil, .aero, .coop, .museum, .jobs

purpose of darsil framework

The DARSIL framework provides a coherent approach for planning digital transformation (future) The DARSIL framework provides a coherent approach for understanding that completed state of digital transformation (past)• The DARSIL framework provides a coherent approach for comparing or benchmarking digital transformation within an industry(present)

static IP address allocation

The IP addresses of each server is unique and it does not change

Internet Assigned Numbers Authority (IANA)

The international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN)

metcalfe's law

The utility of a network equals the square of its number of users

packets (or datagrams)

Unit of data forwarded by a network. All internet transmissions are divided into packets.

VoIP

Voice over Internet protocol - a phone connection through a personal computer with any type of broadband Internet connection.

how to connect device to WAN lines

WAN lines transport analog signals or signal coding. Modems help resolve signal problems 1. DSL phone networks (DSL modems) 2. cable television networks (cable modem router) 3. wireless broadband network (mobile modem router)

Why do companies become data rich, information poor

With so much data available, its hard for managers to get information. Hard turning business data into business intelligence - Lack of data• - inaccurate data - Unaggregated/isolated data sources • In-accessible data (due to Incompatible systems): • legacy systems: Older information systems that are incompatible with other systems, technologies, and ways of conducting business. • Operational data cannot always be queried: • Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. • Database analysis requires significant processing. Reasons Why Organizations Become Data Rich, InformationPoor

what is a computer network?

a collection of computers that communicate with one another over transmission lines or wirelessly - one of more servers and several client computers

intranet

a private LAN designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization -

Core ERP components:

accounting module, finance module, marketing module, production module, inventory module and HR module

supervised data mining

application of analyses in which the data analyst uses his knowledge to influence what model to be used for the analyses, e.g. regression analyses, neuronal network analyses,

unsupervised data mining

application of analyses to data and observing the results thereafter, e.g. clustering, decision analyses, market basket analyses

unsponsored generic TLDs

are .com, .net, .org, .int, .arpa, .biz, .info, .name and .pro. Unsponsored TLDs operate without any sponsoring organization and often have fewer restrictions for registrations than sponsored TLDs

Private IP address

are used "inside" a network, like the one you probably run at home. have to be on a unique LAN - ex. 4 digit inside northeastern number only valid within company

Public IP address

are used on the outside of your network. It's the main address that the home or business uses to communicate with the Internet. - think of ur phone number that can get to anyone

reporting systems are used primarily for

assessment

communications over short distances

bluetooth is used for short range (10m) ex. phone headsets, GPS

OLAP

builds on the unusual components and functions of a reporting system by providing an OLAP cube and modeling to determine data exploration and analysis

types of extranet connections

cable, internet, DSL broadband, fiber optics, ethernet

communication on the internet

communicating happens on the internet when one software application successfully sends information to another software

servers

computers that share their resources with users working on client computers ex. mail servers, print servers, application servers

Which elements are included in the "WHY" segment of DARSIL?

customer experience, value, operations (speed, cost, quality), scalability, flexibility and business model

e-commerce

deployment of part of most of an organizations offline commercial activities on the internet ex. buying, ordering, selling and tracking goods, credit verification, payment, etc

OLAP: has measures and dimensions

dimension: business category of a measure (product, customer, location, etc) measure: attribute of the dimension (data item of interest) - it is the item that is to be summed or averaged by categories ex. $ volume of sales is an example

example of a prediction (data mining)

estimating the probability that a customer will default on a loan

CRM

focus: customers, products and contacts

ERP

focus: products, services and ordera

machine learning

form of AI where algorithms learn from data with (or without) human guidance to improve predictions or classifications of current data

simple reporting tools

generate information from data as a result of four operations - filtering data - sorting data - grouping data - making simple calculations on the data

business uses of machine learning

image analysis/ object detection: machine learning analyses images for diseases or recognition fraud detection: machines learning could be used to prevent attempts to fraudulently use a credit card automatic helplines/chatbots: online chatbots use machine learning to determine how to respond to customer questions. chatbots learn from records of past conversations to come up wit appropriate responses medical imagine and diagnostics: machine learning can be trained to identify markers of illnesses

data mining is also known as

knowledge discovery in data (KDD)

data warehouses

large computer files that store millions and even billions of pieces of individual data. - used to manage, prepare, consolidate and store data that was extracted from other sources and intended specifically for the purposes of data mining and analytics

complex set up 2

many sub domains share single domain name ex northeastern.edu

Name three technologies that are included in the "HOW" segment of DARSIL?

mobile tech, cloud tech, artificial intelligence, analytics, RFID, Big data, blockchain, e-com, internet of things, blockchain

DARSIL Framework

o Define: what issues caused the organization to iniitate a transformation journey? o Analyze: which specific processes, architectures and systems needed to be changed or reconfigured? o Review: Which of the available digital technologies are potential solutions to the company's challenges? o Select: Which of the digital technologies did the company deploy? o Integrate: into which business and customer processes were the digital technologies integrated? o Learn: in which areas is the digital transformation journey complete and in which areas is it incomplete?

what are the past present and future ways DARCIL can be used

o Future: The DARSIL framework provides a clear approach for planning digital transformation o Past: Provides the approach for understanding the completed state of digital transformation o Present: Provides approach for comparing or benchmarking digital transformation within an industry

Which elements are included in the "WHAT" segment of DARSIL?

o People: social behavioral system, employee and partners reward system, knowledge and competence infrastructure o Process: product design and production process, purchase and inventory management, customer service and marketing process, sales and fulfillment process o Technology and structures: information and knowledge assets, information and production technologies, distribution and supply chain technologies, business model and product structures

complex set up 1

one domain name used by thousands of servers ex. amazon.

Extranets

private intranets extended to authorized users outside the organization. connects computers and intranets at separate sites

Types of IP addresses

public, private thn static, dynamic

OLAP reporting tools

query tools: A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria python: A general purpose programming language that is also popular for data analytics R: A programming language specifically created for analytics, statistical, and graphical computing graphical query tools: Allow a user to create a query through a point-and-click or drag-and-drop interface, rather than requiring programming knowledge.

types of BI software

reporting systems (assessing data) = descriptive analytics OLAP systems (assessing data) = diagnostic analytics data mining systems (predictive analytics) = predictive analytics

levels of business intelligence systems

reporting systems, online analytical processing (OLAP) and data mining systems/ business intelligence systems

protocols

set of rules that ensures two resources on the internet can effectively exchange information or packets - if you have email in browser, to send that email to gmails server you will need a protocol to break the message into packets and send to server

how BI prediction process works and comparing databases to data warehouses

slide 29 and 30

star vs bus topology

star: high cabling cost, fast to send signals to other machines, more secure because traffic not recieved by every machine in network, more reliable, if one connection is deteached the others will work bus: lower cabling cost, slower in sendng signals to others, less secure, less reliable

data mart

subset of an organizational data store oriented to a specific purpose. analytical data stores designed to focus on specific business functions or for a specific community within an organization often derived from subsets of data in a data warehouse

reporting systems -NASDQ EX

take data on date, open, close and volume use the tool to put into a chart that has the day of the week and change in open/close create a dashboard on analytics

dynamic IP address allocation

the IP addresses for laptops, smart phones and other devices are assigned anytime the device connects to the Internet - multiple poeple use it one day - can rationalize use of IP

data mining

the process of analyzing data to extract information not offered by the raw data alone (uncovers hidden patterns and relationships in data) extracting useful information from a vast amount of data

OLAP = dynamic

the user interacts with the report and drills down on the data hierarchy and explores different views of the data and OLAP cube - provides real time manipulation of data and much faster than reporting system

business intelligence

these systems are software products that enable firms to transform operational data and to reveal meaningful but hidden patterns and relationships with data

three types of ISPs

tier 1: networks whose servers are connected with fiber optic backbone cable of country. connect two continents together with undersea cables (closest to internet highway of the country) tier 2: networks whose servers aggregate traffic from tier 3 or from large organizations and route traffic through infrastructure of other tier 2 firms through tier 1 infrastructure (main function to take traffic from tier 3 and move to tier 1) tier 3: provides internet access technologies such as cable, DSL, fiber or wireless access network tools to end consumers (closest to customer)

Data Lakes are ____________ for _________

unstructured data storage technology; Big Data

document exchange needs

when two firms are doing business together, they need to exchange documents like invoices, bills, orders, etc.

uses of data mining: customer segmentation

which clients belong to which group of users

uses of data mining: customer churn

which customers are likely to defect or leave

uses of data mining: marketing promotion and targeting

which customers will respond to offer

uses of data mining: collaborative filtering

which personalization should be applied to a customer based on the preferences observed across similar customers

uses of data mining: market basket analysis

which products are bought together and how much is spent per basket

uses of data mining: fraud detection

which transaction is likely fraudulent

communications over moderate distances (WLAN)

wifi radio waves are used to extend wire-based LAN's. wireless network interface cards (WNIC) are used for transmission


Set pelajaran terkait

(PrepU) Chapter 13: Assessing Nutritional Status

View Set

Chapter 6 What is Water and Where Does it Come From

View Set

MUS 354 Part 2 Facts Exam CH 6-8

View Set

Introduction to Literature Test 1

View Set

Atomic Numbers and Electron Configuration Assignment and Quiz

View Set