MIS 101 Final (Professor Choi)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/83

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

84 Terms

1
New cards

Business intelligence systems

An IS that processes operational, social, and other data to identify patterns, relationships, and trends, or business intelligence, for use by business professionals or knowledge workers.

2
New cards

BI application

The software component of a BI system.

3
New cards

Primary Activities in the BI Process (Data)

Obtain, Cleanse, Organize & Relate, Catalog.

4
New cards

Primary Activities in the BI Process (Analysis)

Reporting, Data mining, BigData, Knowledge management.

5
New cards

Primary Activities in the BI Process (Publish)

Print, Web servers, Report servers, Automation.

6
New cards

Data Sources for BI

Operational databases, Social data, Purchased data, Employee knowledge.

7
New cards

Data Warehouse

A repository for an organization's BI data.

8
New cards

Data Mart

A data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.

9
New cards

Basic Operations for processing BI Data

Sorting, Filtering, Grouping, Calculating, Formatting

10
New cards

RFM Analysis

Recently, Frequently, Money (amount).

11
New cards

Online Analytical Processing (OLAP)

A category of software tools that provides analysis of data stored in a data warehouse, enabling users to analyze different dimensions of multidimensional data.

12
New cards

Supervised Data Mining

Uses a priori model for prediction.

13
New cards

Unsupervised Data Mining

No a priori hypothesis or model. Findings obtained solely by data analysis.

14
New cards

Market-Basket Analysis

Identify sales patterns in large volumes of data, identifying what products customers tend to buy together to compute probabilities of purchases.

15
New cards

Decision Trees

Unsupervised data mining technique involving a hierarchical arrangement of criteria to predict a value or classification.

16
New cards

BigData

Huge volume, rapid velocity, great variety of data.

17
New cards

Hadoop

Open-source program supported by Apache Software Foundation that manages thousands of computers and implements MapReduce.

18
New cards

Alternatives for Publishing BI

Email or collaboration tool, Web server, SharePoint, BI server.

19
New cards

Content Management Systems (CMS)

Support management and delivery of documents and other expressions of employee knowledge.

20
New cards

Knowledge Management (KM)

Creating value from intellectual capital and sharing knowledge with those who need that capital, preserving organizational memory.

21
New cards

Expert Systems

Rule-based systems that encode human knowledge, processing IF side of rules to report values of all variables.

22
New cards

Artificial Intelligence (AI)

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal.

23
New cards

Goal of AI

Weak AI focuses on completing a single specific task, while Strong AI can complete all of the same tasks a human can, and superintelligence is capable of intelligence more advanced than human intelligence.

24
New cards

Singularity

Computer systems adapt and create their own software without human assistance, possessing and creating information for themselves.

25
New cards

Purpose of a Database

To organize, keep track of things, and track multiple themes.

26
New cards

Database Components

Columns, also called fields, and rows, also called records, as well as characters, also called bytes.

27
New cards

Database Management System (DBMS)

A program used to create, process, and administer a database; examples include DB2, Access, SQL Server, and Oracle Database.

28
New cards

SQL (Structured Query Language)

International standard language used by nearly all DBMS to process a database.

29
New cards

DBMS Process Operations

Read, insert, modify, and delete data.

30
New cards

Forms

View data; insert new, update existing, delete existing data.

31
New cards

Queries

Search using values provided by user.

32
New cards

Reports

Structured presentation of data using sorting, grouping, filtering, other operations.

33
New cards

Application programs

Provide security, data consistency, special purpose processing, e.g., handle out-of-stock situations.

34
New cards

Entities

Something to track, e.g., order, customer, salesperson, item.

35
New cards

Attributes

Describe characteristics of entity, e.g., OrderNumber, CustomerNumber, VolunteerName.

36
New cards

Identifier

Uniquely identifies one entity instance from other instances, e.g., StudentIDNumber

37
New cards

Maximum cardinality

Maximum number of entities in a relationship.

38
New cards

Minimum cardinality

Minimum number of entities in a relationship.

39
New cards

Normalization

Converting a poorly structured table into two or more well-structured tables to minimize data integrity problems.

40
New cards

How to represent each entity with a table

Entity identifier becomes table key; Entity attributes become table columns.

41
New cards

eHermes Chooses Option 1

Uses SQL Server to store metadata and creates E-R diagram.

42
New cards

NoSQL DBMS (NotRelational DBMS)

Supports very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud, without ACID transaction support.

43
New cards

NewSQL DBMS

Process very high levels of transactions, like NoSQL DBMS, but provide ACID support; may or may not support relational model.

44
New cards

ACID Transactions

Atomic, Consistent, Isolated, Durable transactions.

45
New cards

Elastic Leasing

Automatically adjusts for unpredictable demand and limits financial risks associated with cloud resources.

46
New cards

Pooled Resources

Physical hardware is shared in the cloud, leading to economies of scale.

47
New cards

Economies of Scale

The average cost decreases as the size of the operation increases.

48
New cards

Virtualization

A driver for cloud technology. Enables standardized processing.

49
New cards

SaaS (Software as a Service)

A cloud service where vendors provide software applications over the internet (e.g., Salesforce.com, Office 365).

50
New cards

PaaS (Platform as a Service)

A cloud service where vendors provide a platform allowing customers to develop, run, and manage applications (e.g., Microsoft Azure).

51
New cards

IaaS (Infrastructure as a Service)

A cloud service where vendors provide basic computing infrastructure like servers and storage (e.g., Amazon EC2).

52
New cards

Personal Area Network (PAN)

Devices connected around a single person.

53
New cards

Local Area Network (LAN)

Computers connected at a single physical site.

54
New cards

Wide Area Network (WAN)

Computers connected between two or more separated sites.

55
New cards

Internet

Networks of networks.

56
New cards

IEEE 802.3

Wired LAN protocol; Ethernet.

57
New cards

IEEE 802.11

Wireless LAN protocol.

58
New cards

Bluetooth

Transmits data short distances for personal networks.

59
New cards

Public IP address

Identifies a unique device on the Internet.

60
New cards

Private IP address

Identifies a device on a private network, usually a LAN.

61
New cards

DNS (Domain Name System)

Translates domain names to IP addresses.

62
New cards

URL (Uniform Resource Locator)

Internet address protocol, such as http://.

63
New cards

Three-Tier Architecture

Architecture with User Tier(Web Browsers), Server Tier (Web Server), and Database Tier(DBMS computer).

64
New cards

VPN (Virtual Private Network)

Technology used to establish a secure connection to a private network over the internet.

65
New cards

WSDL (Web Services Description Language)

Standard for describing the services, inputs, outputs, and other data supported by a web service.

66
New cards

SOAP

Communication protocol for requesting Web services and for sending responses to Web service requests.

67
New cards

XML (eXtensible Markup Language)

Used for transmitting documents with more overhead.

68
New cards

JSON (JavaScript Object Notation)

Markup language used for transmitting documents; preferred for transmitting volumes of data between servers and browsers.

69
New cards

Safeguards

Protective actions to minimize loss from threats and vulnerabilities.

70
New cards

Threats

Sources of danger that seek to undermine data and other assets.

71
New cards

Vulnerabilities

Weaknesses in systems that make them susceptible to threats.

72
New cards

Pretexting

Attempting to obtain unauthorized data by posing as someone else.

73
New cards

Phishing

Obtaining unauthorized data through email spoofing and phishing sites.

74
New cards

Spoofing

Pretending to be someone else via a false IP or email address.

75
New cards

Sniffing

Intercepting computer communications.

76
New cards

Hacking

Breaking into systems to steal data.

77
New cards

Usurpation

Occurs when someone deceives by pretending to be someone else

78
New cards

Faulty Service

When systems do not operate correctly because of incorrect data modification, systems working incorrectly, faulty service, and denial of service.

79
New cards

Denial of Service (DoS)

Attacks meant to shut down a web site or computer resource.

80
New cards

SQL Injection Attack

Entering a user SQL statement into a form instead of name or other data resulting in data disclosure, damage and loss.

81
New cards

Key Escrow

A symmetric key is encrypted for secure communication.

82
New cards

Hardening

Special versions of operating system, lock down or eliminate operating systems features and functions not required by application.

83
New cards

Firewall Log

Lists of all dropped packets, infiltration attempts, unauthorized access, attempts from within the firewall.

84
New cards

Honeypots

Computers setup to attract and detect computer criminals.