MIS 309 Final- Ch 15-17

5.0(2)
studied byStudied by 18 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/82

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

83 Terms

1
New cards
Raw facts and figures
data
2
New cards
highly specific and is stored in a predefined format
structured data
3
New cards
many varied types of data that are stored in their native formats
unstructured data
4
New cards
a real-world example of structured versus unstructured data
the date and time of an email (structured) versus the content of the email itself (unstructured)
5
New cards
data presented in a context so that it can answer a question or support decision-making
information
6
New cards
insight derived from experience and expertise, based on data and information
knowledge
7
New cards
the collections, storage, and analysis of extremely large, complex, and often unstructured data sets that can be used by organizations to generate insights that would otherwise be impossible to make
big data
8
New cards
what is decision making enabled by?
standardized corporate data and access to third-party data sets through cheap, fast computing and easier-to-use software
9
New cards
a term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis
business intelligence (BI)
10
New cards
a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions
analytics
11
New cards
a type of artificial intelligence that leverages massive amounts of data so that computers can act and improve on their own without additional programming
machine learning
12
New cards
single table or a collection of related tables
database
13
New cards
software for creating, maintaining, and manipulating data
database management systems (DBMS) / also known as database software
14
New cards
a programming language used to create and manipulate databases
structured query language (SQL)
15
New cards
common SQL commands
SELECT, UPDATE, INSERT, DELETE
16
New cards
a row in a database table; records represent a single instance of whatever the table keeps track of
row or record
17
New cards
a column in a database table; columns represent each category of data contained in a record
column or field
18
New cards
list of data, arranged in columns or fields and rows or records
table or file
19
New cards
most common standard for expressing databases, whereby tables (files) are related based on common keys
relational database
20
New cards
What is data from external sources able to do/not do?
can provide operational insight for increased efficiency and cost savings; may give firms a high-impact edge; might not yield competitive advantage on its own
21
New cards
firms that collect and resell data
data aggregators
22
New cards
What is concerning about the internet and data aggregators?
easy access to data that had been public but is otherwise difficult to access; accuracy concerns; privacy concerns
23
New cards
a set of databases to support decision-making in an organization
data warehouse; also referred to as an enterprise data warehouse (EDW)
24
New cards
database or databases found on addressing the concerns of a specific problem or business unit; structured for fast online queries and exploration; collects data from many different operational systems; may contain huge volumes of data
data mart
25
New cards
example of a data mart
database: 2020 US census data

data warehouse: all census data ever collected worldwide
26
New cards
identifying and retrieving relevant electronic information to support litigation efforts
e-discovery
27
New cards
provide regular summaries of information in a predetermined format
canned reports
28
New cards
puts users in control so that they can create and custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters
ad hoc reporting tools
29
New cards
heads-up display of critical indicators that allows managers to get a graphical glance at key performance metrics
dashboards
30
New cards
takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube
online analytical processing (OLAP)
31
New cards
special database used to store data in OLAP reporting
data cube
32
New cards
two types of popular business intelligence tools
tableau and power BI
33
New cards
the process of using computers to identify hidden patterns in, and to build models from, large datasets
data mining
34
New cards
key areas of leverage in data mining
customer segmentation and market basket analysis; marketing and promotion targeting; collaborating filtering and customer churn; fraud detection, financial modeling, hiring and promotion
35
New cards
prerequisites for data mining to work
organization must have clean, consistent data; events in that data should reflect trends
36
New cards
computer software that can mimic or improve upon functions that would otherwise require human intelligence
artificial intelligence (AI)
37
New cards
a type of machine learning that uses multiple layers of interconnections among data to identify pattern and improve predicted results
deep learning
38
New cards
examines data and hunts down and exposes patterns, in order to build models to exploit findings
neural networks
39
New cards
leverages rules or examples to perform a task in a way that mimics applied human expertise
expert systems
40
New cards
model building techniques where computers examine many potential solutions to a problem
genetic algorithms
41
New cards
organization or firm that provides access to the internet
internet service provider (ISP)
42
New cards
how do internet service providers work?
by connecting to one another, exchanging traffic and ensuring that messages can get to any other computer that’s online and willing to communicate
43
New cards
The internet was designed to be redundant and fault-tolerant- if one network, connecting wire, or server stops working, everything else should keep on running.

True or false?
true
44
New cards
the name of the network you’re trying to connect to (usually represents an organization)
domain name
45
New cards
the computer you’re looking for on that network
the host
46
New cards
a firm that provides hardware and servers to run the websites of others
web hosting services
47
New cards
a nonprofit governance and standards-setting body that accredits registrars throughout the world
ICANN (internet corporation for assigning names and numbers)
48
New cards
value used to identify a device that is connected to the internet; can be used to identify a user’s physical location in some cases
IP address
49
New cards
internet directory service that allows devices and services to be named and discoverable; distributed database that looks up host and domain names and returns the actual IP addresses for them
domain name service (DNS)
50
New cards
temporary storage space used to speed computing tasks
cache
51
New cards
technologies that connect end users to the Internet; refers to the fact that these connections are usually the slowest part of the network
last mile
52
New cards
high-speed internet connections (cable, fiber, wireless)
broadband
53
New cards
insulated copper cable used by television providers; has shielding that reduces electrical interference; allows cable signals to travel longer distances without degrading and with less chance of interference
coaxial cable
54
New cards
broadband service provided via light-transmitting fiber-optic cables; fastest last-mile technology and works easily over long distances
fiber to the home (FTTH)
55
New cards
limitations of fiber to the home
need to build fiber infrastructure from scratch; cost of buildout is enormous
56
New cards
provided by earth-bound base stations like cell phone towers
terrestrial wireless
57
New cards
What were the first residential satellite services used for?
downloads
58
New cards
the principal that all internet traffic should be treated equally
net neutrality
59
New cards
factors that can amplify a firm’s vulnerability of a security breach
personnel issues, technology problems, procedural factors, operational issues
60
New cards
who is breaching security?
corporate insiders, malicious insider attacks, and accidental
61
New cards
a term that may be applied to either 1) someone who breaks into a computer, or 2) to a particularly clever programmer
external hacker
62
New cards
uncover computer weaknesses without exploiting them; contribute to improving system security
white hat hacker
63
New cards
computer criminals who exploit a system’s weakness for personal gain
black hat hackers
64
New cards
protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
hacktivists
65
New cards
cybercriminals who infiltrate systems and collect data for illegal resale
data harvesters
66
New cards
criminals that purchase assets from data harvesters to be used for illegal financial gain; they might buy goods using stolen credit cards or create false accounts
cash-out fraudsters
67
New cards
hordes of surreptitiously infiltrated computers, controlled remotely
botnets
68
New cards
shutting down websites with a crushing load of seemingly legitimate requests
distributed denial of service (DDoS) attacks
69
New cards
a broad range of malicious activities accomplished through human interactions; uses psychological manipulation to trick users into making security mistakes or giving away sensitive information
social engineering
70
New cards
email transmissions and packets that have been altered to forge or disguise their origin or identity
spoofed email
71
New cards
cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software
phishing
72
New cards
attacks are messages typically personalized based on public information the attacker has found on the recipient
spear phishing
73
New cards
involves a person creating a fictional persona or fake identity on a social networking service
catfishing
74
New cards
new attacks that haven’t been clearly identified and haven’t been incorporated into security screening systems
zero-day exploits
75
New cards
measure and analyze human body characteristics for identification or authentication
biometrics
76
New cards
when identity is proven by presenting more than one item for proof of credentials
multi-factor authentication
77
New cards
seeks to compromise a computing system without permission
malware
78
New cards
seeks to encrypt a computing system in order to collect payment to decrypt the system
ransomware
79
New cards
methods of malware infection
user clicks on a link in an email or text; user downloads software
80
New cards
goals of malware
take control of computer/phone; spyware; keylogger; screen capture
81
New cards
monitors user actions, network traffic, or scans for files
spyware
82
New cards
records user keystrokes
keylogger
83
New cards
records pixels that appear on a user’s screen to identify propritary information
screen capture