MIS 309 Final- Ch 15-17

studied byStudied by 18 people
5.0(2)
Get a hint
Hint

Raw facts and figures

1 / 82

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

83 Terms

1

Raw facts and figures

data

New cards
2

highly specific and is stored in a predefined format

structured data

New cards
3

many varied types of data that are stored in their native formats

unstructured data

New cards
4

a real-world example of structured versus unstructured data

the date and time of an email (structured) versus the content of the email itself (unstructured)

New cards
5

data presented in a context so that it can answer a question or support decision-making

information

New cards
6

insight derived from experience and expertise, based on data and information

knowledge

New cards
7

the collections, storage, and analysis of extremely large, complex, and often unstructured data sets that can be used by organizations to generate insights that would otherwise be impossible to make

big data

New cards
8

what is decision making enabled by?

standardized corporate data and access to third-party data sets through cheap, fast computing and easier-to-use software

New cards
9

a term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis

business intelligence (BI)

New cards
10

a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions

analytics

New cards
11

a type of artificial intelligence that leverages massive amounts of data so that computers can act and improve on their own without additional programming

machine learning

New cards
12

single table or a collection of related tables

database

New cards
13

software for creating, maintaining, and manipulating data

database management systems (DBMS) / also known as database software

New cards
14

a programming language used to create and manipulate databases

structured query language (SQL)

New cards
15

common SQL commands

SELECT, UPDATE, INSERT, DELETE

New cards
16

a row in a database table; records represent a single instance of whatever the table keeps track of

row or record

New cards
17

a column in a database table; columns represent each category of data contained in a record

column or field

New cards
18

list of data, arranged in columns or fields and rows or records

table or file

New cards
19

most common standard for expressing databases, whereby tables (files) are related based on common keys

relational database

New cards
20

What is data from external sources able to do/not do?

can provide operational insight for increased efficiency and cost savings; may give firms a high-impact edge; might not yield competitive advantage on its own

New cards
21

firms that collect and resell data

data aggregators

New cards
22

What is concerning about the internet and data aggregators?

easy access to data that had been public but is otherwise difficult to access; accuracy concerns; privacy concerns

New cards
23

a set of databases to support decision-making in an organization

data warehouse; also referred to as an enterprise data warehouse (EDW)

New cards
24

database or databases found on addressing the concerns of a specific problem or business unit; structured for fast online queries and exploration; collects data from many different operational systems; may contain huge volumes of data

data mart

New cards
25

example of a data mart

database: 2020 US census data

data warehouse: all census data ever collected worldwide

New cards
26

identifying and retrieving relevant electronic information to support litigation efforts

e-discovery

New cards
27

provide regular summaries of information in a predetermined format

canned reports

New cards
28

puts users in control so that they can create and custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters

ad hoc reporting tools

New cards
29

heads-up display of critical indicators that allows managers to get a graphical glance at key performance metrics

dashboards

New cards
30

takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube

online analytical processing (OLAP)

New cards
31

special database used to store data in OLAP reporting

data cube

New cards
32

two types of popular business intelligence tools

tableau and power BI

New cards
33

the process of using computers to identify hidden patterns in, and to build models from, large datasets

data mining

New cards
34

key areas of leverage in data mining

customer segmentation and market basket analysis; marketing and promotion targeting; collaborating filtering and customer churn; fraud detection, financial modeling, hiring and promotion

New cards
35

prerequisites for data mining to work

organization must have clean, consistent data; events in that data should reflect trends

New cards
36

computer software that can mimic or improve upon functions that would otherwise require human intelligence

artificial intelligence (AI)

New cards
37

a type of machine learning that uses multiple layers of interconnections among data to identify pattern and improve predicted results

deep learning

New cards
38

examines data and hunts down and exposes patterns, in order to build models to exploit findings

neural networks

New cards
39

leverages rules or examples to perform a task in a way that mimics applied human expertise

expert systems

New cards
40

model building techniques where computers examine many potential solutions to a problem

genetic algorithms

New cards
41

organization or firm that provides access to the internet

internet service provider (ISP)

New cards
42

how do internet service providers work?

by connecting to one another, exchanging traffic and ensuring that messages can get to any other computer that’s online and willing to communicate

New cards
43

The internet was designed to be redundant and fault-tolerant- if one network, connecting wire, or server stops working, everything else should keep on running.

True or false?

true

New cards
44

the name of the network you’re trying to connect to (usually represents an organization)

domain name

New cards
45

the computer you’re looking for on that network

the host

New cards
46

a firm that provides hardware and servers to run the websites of others

web hosting services

New cards
47

a nonprofit governance and standards-setting body that accredits registrars throughout the world

ICANN (internet corporation for assigning names and numbers)

New cards
48

value used to identify a device that is connected to the internet; can be used to identify a user’s physical location in some cases

IP address

New cards
49

internet directory service that allows devices and services to be named and discoverable; distributed database that looks up host and domain names and returns the actual IP addresses for them

domain name service (DNS)

New cards
50

temporary storage space used to speed computing tasks

cache

New cards
51

technologies that connect end users to the Internet; refers to the fact that these connections are usually the slowest part of the network

last mile

New cards
52

high-speed internet connections (cable, fiber, wireless)

broadband

New cards
53

insulated copper cable used by television providers; has shielding that reduces electrical interference; allows cable signals to travel longer distances without degrading and with less chance of interference

coaxial cable

New cards
54

broadband service provided via light-transmitting fiber-optic cables; fastest last-mile technology and works easily over long distances

fiber to the home (FTTH)

New cards
55

limitations of fiber to the home

need to build fiber infrastructure from scratch; cost of buildout is enormous

New cards
56

provided by earth-bound base stations like cell phone towers

terrestrial wireless

New cards
57

What were the first residential satellite services used for?

downloads

New cards
58

the principal that all internet traffic should be treated equally

net neutrality

New cards
59

factors that can amplify a firm’s vulnerability of a security breach

personnel issues, technology problems, procedural factors, operational issues

New cards
60

who is breaching security?

corporate insiders, malicious insider attacks, and accidental

New cards
61

a term that may be applied to either 1) someone who breaks into a computer, or 2) to a particularly clever programmer

external hacker

New cards
62

uncover computer weaknesses without exploiting them; contribute to improving system security

white hat hacker

New cards
63

computer criminals who exploit a system’s weakness for personal gain

black hat hackers

New cards
64

protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage

hacktivists

New cards
65

cybercriminals who infiltrate systems and collect data for illegal resale

data harvesters

New cards
66

criminals that purchase assets from data harvesters to be used for illegal financial gain; they might buy goods using stolen credit cards or create false accounts

cash-out fraudsters

New cards
67

hordes of surreptitiously infiltrated computers, controlled remotely

botnets

New cards
68

shutting down websites with a crushing load of seemingly legitimate requests

distributed denial of service (DDoS) attacks

New cards
69

a broad range of malicious activities accomplished through human interactions; uses psychological manipulation to trick users into making security mistakes or giving away sensitive information

social engineering

New cards
70

email transmissions and packets that have been altered to forge or disguise their origin or identity

spoofed email

New cards
71

cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software

phishing

New cards
72

attacks are messages typically personalized based on public information the attacker has found on the recipient

spear phishing

New cards
73

involves a person creating a fictional persona or fake identity on a social networking service

catfishing

New cards
74

new attacks that haven’t been clearly identified and haven’t been incorporated into security screening systems

zero-day exploits

New cards
75

measure and analyze human body characteristics for identification or authentication

biometrics

New cards
76

when identity is proven by presenting more than one item for proof of credentials

multi-factor authentication

New cards
77

seeks to compromise a computing system without permission

malware

New cards
78

seeks to encrypt a computing system in order to collect payment to decrypt the system

ransomware

New cards
79

methods of malware infection

user clicks on a link in an email or text; user downloads software

New cards
80

goals of malware

take control of computer/phone; spyware; keylogger; screen capture

New cards
81

monitors user actions, network traffic, or scans for files

spyware

New cards
82

records user keystrokes

keylogger

New cards
83

records pixels that appear on a user’s screen to identify propritary information

screen capture

New cards

Explore top notes

note Note
studied byStudied by 25 people
... ago
4.0(1)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 48 people
... ago
4.5(2)
note Note
studied byStudied by 3007 people
... ago
4.9(16)

Explore top flashcards

flashcards Flashcard (61)
studied byStudied by 2 people
... ago
5.0(2)
flashcards Flashcard (21)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 10 people
... ago
4.0(1)
flashcards Flashcard (20)
studied byStudied by 47 people
... ago
5.0(1)
flashcards Flashcard (89)
studied byStudied by 303 people
... ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 17 people
... ago
4.0(2)
flashcards Flashcard (191)
studied byStudied by 30 people
... ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 5 people
... ago
4.0(1)
robot