Business Data Science Technologies Final (Exam 3)

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

Batch processing system

business transactions accumulated over period of time & prepared for processing as one unit/batch, delay btw event & processing of transactions

2
New cards

online transaction processing (OLTP)

each transaction processed immediately, often seen as more efficient

3
New cards

enterprise system

central to individuals & org., info can be shared across all business functions/levels of management

4
New cards

enterprise resource planning (ERP)

set of integrated programs that manage a company’s vital business operations for an entire organization

5
New cards

business process

set of coordinated activities that takes 1 or more kinds of input to create an output value to the customer of that process

6
New cards

supply chain management

system includes planning, executing, controlling all activities involved in: sources raw materials, converting raw to finished products, delivering finished product

7
New cards

process for developing production plan

  • sales forecasting

  • sales and operations plan (S&OP)

  • demand management

  • detailed scheduling

  • materials requirement planning (MRP)

  • purchasing

  • production

  • sales ordering

8
New cards

customer relationship management (CRM)

helps company manage all aspects of customer encounters, to understand/ anticipate needs of customers, used mostly in sales/marketing

9
New cards

key features of CRM system

  • contact management

  • sales management

  • customer support

  • marketing automation

  • analysis

  • social networking

  • access by mobile devices

  • import contact data

10
New cards

Product lifecycle management (PLM)

creates common repository of product info/processes (Supports collaborative creation/management)

Types of software:

  • computer aided design

  • computer aided engineering

  • computer aided manufacturing

Types of manufacturing

  • discrete manufacturing

  • process manufacturing

11
New cards

computer-aided design

use of software to assist in creation, analysis, and modification of design of a product/comoponent

12
New cards

computer aided engineering

software use to analyze robustness & performance of components and assemblies

13
New cards

computer aided manufacturing

software use to control tools/machinery in manufacturing of components & products

14
New cards

discrete manufacturing

production of distinct items (ex: cars, airplanes, toys, furniture) that can be decomposed into basic components

15
New cards

process manufacturing

production of products that’s result of chemical process and can’t be easily decomposed into basic components ex) gas, medicines

16
New cards

how to avoid failed implementation

  • assign full-time exec. to manage

  • appoint experienced/independent resource for project oversight

  • allow time for transition

  • put enough time & $ for training

  • define metrics to assess project progress

  • keep project scope defined

  • be wary of modifying enterprise system software to conform to business practices

17
New cards

Vision systems

hardware and software allowing computers to capture/store/manipulate visual images & pictures ex) Augmented reality in medical

18
New cards

ai in jobs

introduced to new industries/applications rapidly, growth of AI could create up to 58 mil jobs by 2022

19
New cards

natural language processing

computer understanding, analyzing, manipulating, and generating natural language for processing, widely used in search engines

20
New cards

brain computer interface

tech interacts w human’s brain and translates info (thoughts) into activity (actions), used in medical field and DARPA

21
New cards

industrial robots

designed for speed, accuracy, and safety (size/look dependent on use), ex) Cartesian robot, SCARA robots, articulated robot)

22
New cards

cartesian robot

take up smaller space (footprint), move in straight lines, commonly used for 3D printing

23
New cards

Selective Compliance Assembly Robot Arm (SCARA)

easier to integrate into complex printing designs, both lateral & rotary movement, faster than cartesians, often used in biomedical field

24
New cards

Articulated robot

made to function like an arm, may have 10 or more rotary joints can move like elbow and twist, often used in industrial manufacturing settings (automotive lines) bc quick & precise

25
New cards

strategic planning

gives framework/direction for decision making, ensures effective use of resources (focus on key priorities), allows organization to be proactive & take advantage of trends, gives measures for judging performance, improves communication

26
New cards

Michael porter’s 5 forces model

most frequently used model for assessing competition

27
New cards

strengths, weaknesses, opportunities, threats (SWOT) matrix

used to analyze org. internal assessment and study of its external environment

28
New cards

technology acceptance model (TAM)

specifies the factors that can lead to better attitudes about the use of new info system & higher acceptance & usage

29
New cards

Diffusion of innovation theory

developed by EM rogers to explain how new idea/product gains acceptance and diffuses through a specific pop. or subset of org.- adoption of innovation is a drawn-out process, some quicker than others

30
New cards

scope

which tasks are included and which aren’t in a project

31
New cards

cost

all capital, expenses, internal cross-charges associated w project’s buildings, operation, maintenance, and support

32
New cards

time

frequently a critical constraint, often projects must be met certain date

33
New cards

quality

degree to which project meets the needs of its users

34
New cards

user expectations

stakeholders will form expectations about how project will be conducted and how it will affect them

35
New cards

schedule management

  • develop workable schedule

  • ensure timely completion of project

  • identify specific tasks

  • sequence tasks

  • estimate resources needed

  • estimate elapsed time to finish each task

  • analyze data to create project schedule

    • controlling & managing changes

36
New cards

gantt chart

graphical tool used for planning, monitoring, and coordinating projects, is a grid listing activities and deadlines

37
New cards

work breakdown structure (WBS)

outline of work to be done to complete the project

38
New cards

project resource management

activities designed to identify, acquire, and manage resources for a project

Forming-Storming-Norming-Performing-Adjourning model

39
New cards

Forming-Storming-Norming-Performing-Adjourning model

useful model to describe how teams develop & evolve

40
New cards

Subscribe

+software more cost-effective for small projects & temporary needs, updates completed by vendor, technical support available 24/7

- offered as is, not able to be modified to match needs, recurring licensing costs

41
New cards

buy

+ acquired & deployed relatively quickly, can “test drive” software before buying

- unmodified software may not be good match to org. needs, maintenance & support costs can be excessive

42
New cards

build your own IS

+ better match to org. needs, potential to achieve competitive advantage

- cost to build can be high compared to purchasing off-shelf, can take months to years to deploy

43
New cards

system development

set of activities involved in building info systems to meet users needs, projects can range from small to large and conducted in diverse fields

44
New cards

waterfall system development

sequential/multistage system process, next stage can’t start until results of current stage approved,

1) investigation, 2) analysis, 3) design, 4) construction, 5) integration/testing 6) implementation

45
New cards

system investigation

to gain a clear understanding of specifics of problem to solve or opportunity to address

1) review systems investigation request

2) identify/recruit team leader & members

3) develop budget/schedule for investigation

4) perform investigation (joint application development, functional decomposition)

5) perform preliminary feasibility analysis

6) prepare draft of investigation report

7) review results of investigation with steering team

46
New cards

agile development

develops system in “sprint” increments lasting 2 weeks- 2 months, concentrates on maxing team’s ability to deliver quickly/ respond to emerging requirements, uses scrum

47
New cards

scrum

method to keep agile system development effort focused & moving quickly, the master coordinates all activities

48
New cards

people

the most important element of information systems

49
New cards

employee requirements for success

training & an understanding of need for info system, motivation to use the info system, access to system support ppl as needed

50
New cards

technology infrastructure

hardware, software, databases, networks, facilities, 3rd party services, required to meet customers’/suppliers’/key business partners’/ regulatory agencies/ employees’ needs, forms foundation of every computer-based info system

51
New cards

processes:

structured set of related activities, takes input, adds value, creates output

52
New cards

procedure

steps to follow to achieve a specific end result, how to achieve end result, who does what when, what to do if something goes wrong

53
New cards

structure

defines relationships btwn org members, defines roles/responsibilities/lines of authority, employees must understand/accept their roles/responsibilities, roles/responsibilities often change w introduction of new info system

54
New cards

types of info systems

personal IS, workgroup IS, enterprise IS, interorganizational IS

55
New cards

personal information system

improves productivity of individual users in performing stand-alone tasks

56
New cards

workgroup information system

enables ppl to work together effectively

57
New cards

enterprise information system

facilitates org-wide business needs

58
New cards

interorganizational information system

enables sharing of info across org boundaries

59
New cards

advanced persistent threat

network attack where intruder gets access to network and stays undetected to steal data over long-period of time

60
New cards

blended threat

sophisticated threat combining features of a virus, worm, trojan horse, and other malicious code into single payload

61
New cards

phishing

act of fraudulently using email to get recipient to reveal personal data

62
New cards

rootkit

set of programs allowing user to gain administrator level access to computer w/out end users consent/knowledge, attacker can gain full control of system and hide its presence

63
New cards

smishing

variation of phishing using text

64
New cards

social engineering

use of deception to trick ppl into divulging data needed to gain access to an info system or network

65
New cards

spam

use of email systems to send unsolicited email to large #’s of ppl

66
New cards

trojan horse

seemingly harmless program where malicious code is hidden, victim is usually tricked into opening bc it looks like useful software from a verified source

67
New cards

virus

piece of programming code, usually disguised as something else, causes computer to behave in unexpected and usually undesirable manner

68
New cards

vishing

similar to smishing but victims receive voice mail message telling them to call a # or go to a website

69
New cards

worm

harmful program residing in active memory of computer and duplicates itself, diff from virus bc can recreate w/out human intervention, often sending copies of themselves to other computers through email

70
New cards

CIA security triad

confidentiality, integrity, availability, layered security solution design to make cyberattacks hard

71
New cards

implementing CIA at network level

authentication methods & encryption

72
New cards

authentication methods

3 types: know/ possess/ or are, 2-factor authorization, biometric authentication

73
New cards

biometric authentication

physiological/behavioral measurements used, requires reference model of unique characteristics stored digitally

74
New cards

encryption

scramble messages or data, only authorized parties can read data, requires encryption key to read

75
New cards

encryption key

value applied to plaintext to product cipher text, required to decipher cipher text

76
New cards

advanced encryption standard (AES)

common symmetric algorithm, used by the WPA2 security protocol

77
New cards

server virtualization

logically dividing a single physical server’s resources to create multiple logical servers, virtual machine acts as it’s own dedicated machine, allows running multiple operating systems

78
New cards

hypervisor

virtual server program controlling host processor and resources, allocating necessary resources to each virtual machine, ensuring they don’t disrupt eachother

79
New cards

software as a service (SaaS)

3rd party provider hosts applications, available to subscribers over internet

+ available from any device, SaaS provider handles upgrades/patches, lower cost software licensing, provider manages service levels and availability

80
New cards

DBMS function

interface btwn application program and database, must request database data through this

81
New cards

concurrency control

addresses situation where 2 or more users/applications access the same record at same time

82
New cards

SQL

special-purpose programming language, used for accessing and manipulating relational database data, conform to ACID properties

83
New cards

ACID properties

atomicity, consistency, isolation, durability, guarantees database transactions are processed reliably, ensures integrity of data in the database

84
New cards

big data

enormous (terabytes or more), complex (sensor to social media data), traditional processes incapable of dealing with them, key characteristics:

1) volume

2) velocity

3) value

4) variety

5) veracity

85
New cards

client/server architecture

many clients request/receive services from servers on the network

86
New cards

domain name system (DNS)

maps name ppl use to locate a website to the IP address that a computer uses to locate a website

87
New cards

uniform resource locator (URL)

web address specifying exact location of a web page using letters & words that map to an IP address and a location on the host

88
New cards

Internet of Things

network of physical objects, embedded w sensors, processors, software, and network connectivity capability

89
New cards

sensor

device capable of sensing something about its surroundings ex) pressure, temp, humidity, pH level, motion, vibration, light

90
New cards

business benefits of IoT

reduce costs to achieve a competitive advantage, deepen org. understanding of consumer preferences/behaviors, improve customer service/experience, improve workplace safety

91
New cards

authentication technologies

used by many org to confirm identity of a user requesting access

92
New cards

digital certificate

attachment to an e-mail message or data embedded in a website that verifies the identity of a sender or website

93
New cards

certificate authority (CA)

trusted third-party org. or company that issues digital certificates