MSIS 2103 Exam 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

Ethics

Sets of principles about right and wrong. Used to make choices guiding decisions.

2
New cards

Law

System of rules, defines what we can and cannot do

3
New cards

Legal acts vs ethical acts

Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right thing to do. (Legal activity does not mean it's ethical)

4
New cards

Problem statement

Clear, concise description of the issue being addressed in decision making.

5
New cards

Professional code of ethics

States the principles and core values that an organization wishes to develop in its leaders and members.

6
New cards

Fair information practices

Set of guidelines governing the collection and use of personal data

7
New cards

General Data Protection Regulation (GDPR)

Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage.

8
New cards

Fair Credit Reporting Act

Act that regulates credit-reporting bureaus regarding their collection, storage, and use of credit information.

9
New cards

Right to Financial Privacy Act

Act that protects the records of financial institutions' customers from unauthorized scrutiny by the federal government.

10
New cards

Fair and Accurate Credit Transitions Act

Act that allows consumers to request and obtain free credit reports.

11
New cards

Health Insurance Portability and Accountability Act (HIPAA)

Act that requires standardized electronic transactions, codes, and identifiers. Also requires health care providers to obtain written consent from patients prior to disclosing any information in their medical records. It also fully digitized medical records.

12
New cards

American Recovery and Reinvestment Act Title XIII

Includes strong privacy provisions for electronic health records (EHRs), including banning the sale of health information, promoting the use of audit trails and encryption, providing rights of access for patients, and mandating that each individual whose health information has been exposed be notified within 60 days after discovery of a data breach.

13
New cards

Family Educational Rights and Privacy Act (FERPA)

Act that assigns certain rights to parents regarding their children's educational records.

14
New cards

Children's Online Privacy Protection Act (COPPA)

A U.S. federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a child's personal information

15
New cards

Fourth Amendment

Protects against unreasonable search and seizure

16
New cards

First Amendment

Protects American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably. Some speech is not protected or forbidden.

17
New cards

Section 230 of the Communications Decency Act

Provides immunity to an Internet service provider (ISP) that publishes user-generated content

18
New cards

Internet filtering

Blocks access to certain Web sites containing material deemed inappropriate or offensive. May block too much

19
New cards

Children's Internet Protection Act (CIPA)

An act that requires federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors.

20
New cards

Defamation

The making of either an oral (slander) or a written (libel) statement of alleged fact that is false and that harms another person. Harm is often of a financial nature.

21
New cards

Frequent defamation lawsuits

Considered a form of censorship. Seek to stop unwanted speech or writings.

22
New cards

Hate speech

Persistent or malicious harassment aimed at a specific person that can be prosecuted under the law.

23
New cards

Fake news

Form of censorship in the form of a false story presented as being factually accurate and appears to be news. Usually created to advance political view or agenda.

24
New cards

Safety-critical system

A system whose failure may cause human injury or death.

25
New cards

Database

A well-designed, organized, and carefully managed collection of data.

26
New cards

Entity

A person, place, or thing (object) for which data is collected, stored, and maintained

27
New cards

File

Collection of entities

28
New cards

Attribute

Characteristic of an entity

29
New cards

Domain

Range of allowable values for a data attribute

30
New cards

Data item

Specific value of a data attribute

31
New cards

Record

Collection of attributes about a specific entity

32
New cards

Primary key

Attribute or set of attributes that uniquely identifies the record

33
New cards

Foreign key

Attribute in one table that refers to the primary key in another table

34
New cards

Schema

Description defining the database's logical and physical structure. Identifies the table and the attributes in each table

35
New cards

Data Definition Language (DDL)

Collection of instructions and commands. Defines and describes data and relationships in a specific database

36
New cards

Data dictionary

Detailed description of data stored in the database

37
New cards

Concurrency control

Addresses situation where two or more users or applications access the same record at the same time

38
New cards

Selecting

Eliminating rows according to certain criteria

39
New cards

Projecting

Eliminating columns in a table

40
New cards

Joining

Combining two or more tables through common data attributes to create a new table

41
New cards

Data normalization

Eliminates data redundancy

42
New cards

SQL

A special-purpose programming language used for accessing and manipulating relational database data.

43
New cards

ACID properties

Properties (atomicity, consistency, isolation, durability) that guarantee relational database transactions are processed reliably and ensure the integrity of data in the database.

44
New cards

Data management

Integrated set of functions. Defines the processers by which data is obtained, certified fit for use, stored, secured, and processed. Ensures data accessibility, reliability, and timeliness meet the data users' needs.

45
New cards

Data governance

Defines roles, responsibilities, and processes. Ensures data can be trusted and used by the entire organization

46
New cards

Big data

Enormous data (terabytes or more) where traditional processes of dealing with them are incapable

47
New cards

Online Transaction Processing (OLTP) systems

Traditionally used to capture data. Do not support data analysis required today

48
New cards

Data warehouse

Large database that holds business information from many sources in the enterprise.

49
New cards

Extract Transform Load (ETL) process

Edits and transforms data into a data warehouse format. Extracts data from a variety of sources and loads data into the warehouse

50
New cards

Data mart

Subset of a data warehouse. Used by small and medium-sized businesses and departments within large companies to support decision making.

51
New cards

Data lake

Takes a "store everything" approach to big data. Saves all data in its raw and unaltered form.

52
New cards

NoSQL database

Database modeled without using table relations. More flexible than relational databases and provides improved access speed. Uses horizontal scaling and does not conform to true ACID properties when processing transactions.

53
New cards

Key-value NoSQL databases

Database with two columns ("key" and "value")

<p>Database with two columns ("key" and "value")</p>
54
New cards

Document NoSQL databases

Store, retrieve, and manage document-oriented information

<p>Store, retrieve, and manage document-oriented information</p>
55
New cards

Graph NoSQL databases

Database that is well-suited for analyzing interconnections

<p>Database that is well-suited for analyzing interconnections</p>
56
New cards

Column NoSQL databases

Database that stores data in columns

<p>Database that stores data in columns</p>
57
New cards

Hadoop

Open-source software framework that enables distributed parallel processing of huge amounts of data across many inexpensive computers.

58
New cards

Hadoop Distributed File System (HDFS)

A system used for data storage that divides the data into subsets and distributes the subsets onto different servers for processing.

59
New cards

Descriptive Analysis

Preliminary data processing stage that identifies data patterns. Includes 2 types: Visual Analytics and Regression Analysis. Answers questions: "Who, what, where, when, and to what extent."

60
New cards

Visual Analytics

Type of Descriptive Analysis that presents data graphically.

61
New cards

Word cloud

Visual depiction of a set of words where words are grouped together based on frequency of their occurrence

<p>Visual depiction of a set of words where words are grouped together based on frequency of their occurrence</p>
62
New cards

Conversion Funnel

A graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.

<p>A graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.</p>
63
New cards

Regression Analysis

Type of Descriptive Analysis that determines the relationship b/w a dependent variable and one or more independent variables. Produces a regression equation

64
New cards

Predictive Analytics

Techniques to analyze current data that identifies future probabilities and trends.

65
New cards

Time Series Analysis

Uses statistical methods and analyzes time series data to extract meaningful statistics and characteristics.

66
New cards

Data mining

A BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making

67
New cards

Genetic Algorithm

An artificial intelligent system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

<p>An artificial intelligent system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem</p>
68
New cards

Linear programming

Finds the optimum value of a linear expression calculated based on the value of a set of decision variables (variables subject to a set of contraints)

<p>Finds the optimum value of a linear expression calculated based on the value of a set of decision variables (variables subject to a set of contraints)</p>
69
New cards

Scenario Analysis

Predicts future values based on certain potential events

70
New cards

Monte Carlo simulation

Provides a spectrum of thousands of possible outcomes. Considers the many variables involved and the range of potential values for each variable

71
New cards

Text analysis

Process for extracting value from large quantities of unstructured text data

72
New cards

Video analysis

Process of obtaining information or insights from video footage

73
New cards

Cloud Computing

Computing environment in which software and storage are provided as an Internet service and accessed with a Web browser

74
New cards

Benefits of public cloud computing

Reduced costs, flexible computing capacity, and increased redundancy in the event of disaster

75
New cards

Issues with public cloud computing

Complex pricing arrangements, wide variations in performance over time, inadequate data security, and vendor lock-in

76
New cards

Public Cloud Computing

A service provider owns and manages the infrastructure with cloud user organizations (tenants) accessing slices of shared hardware resources via the Internet

77
New cards

Private cloud computing environment

Single tenant cloud, organizations often implement due to concerns that their data will not be secure in a public cloud

78
New cards

Hybrid Cloud Computing

Composed of both private and public clouds integrated through a private network. Organizations typically use the public cloud to run applications w/ less sensitive security requirements but run more critical applications on the private cloud

79
New cards

Business benefits of IoT

1. Reduce costs to achieve a competitive advantage

2. Deepen the organization's understanding of consumer preferences and behaviors

3. Improve customer service and experience

4. Improve workplace safety

80
New cards

Types of IoT applications

1. Connect and monitor

2. Control and react

3. Predict and adapt

4. Transform and explore

<p>1. Connect and monitor</p><p>2. Control and react</p><p>3. Predict and adapt</p><p>4. Transform and explore</p>
81
New cards

Potential issues with Iot Applications

Many issues with the receipt and usability of sensor data, and security is a very major issue

82
New cards

E-commerce

Conducting business activities electronically over computer networks

83
New cards

Business-to-Business (B2B) E-commerce

A subset of e-commerce in which all the participants are organizations. Useful for connecting business partners in a virtual supply chain to cut resupply times and reduce costs

84
New cards

Business-to-Consumer (B2C) E-Commerce

A form of e-commerce in which customers deal directly with an organization and avoid intermediaries. Steady growth with cheaper goods and services online.

85
New cards

Consumer-to-Consumer (C2C) E-Commerce

Involves electronic transactions b/w consumers facilitated by a third party (eBay, Etsy, ...). Sales must not violate the rules of various county, state, and country legal jurisdictions

86
New cards

E-Government

Use of information and communications technology to: simplify information sharing, speed formerly paper-based processes, and improve relationships b/w citizens & government

87
New cards

Government-to-consumer (G2C)

refers to the electronic commerce activities performed between a government and its citizens or consumers including paying taxes, registering vehicles, providing information and services, and so on.

88
New cards

Government-to-business (G2B) e-commerce

occurs when a government entity sells products and services to businesses

89
New cards

Government-to-government (G2G) e-commerce

e-commerce activities within a nation's government (can also refer to e-commerce activities between 2 or more nations' governments)

90
New cards

Mobile commerce (m-commerce)

electronic commerce transactions that are conducted with a mobile device

91
New cards

Advantages of E/M - Commerce

Conversion to an e- or m-commerce system enables organizations to:

- Reach new customers

- Reduce costs

- Speed the flow of goods and information

- Increase the accuracy of orders

- Improve customer service

92
New cards

How to attract customers to e-commerce

- Obtain and register a domain name

- Make your site search-engine friendly

93
New cards

Authentication technologies

Used by many organizations to confirm the identity of a user requesting access

94
New cards

Certificate authority (CA)

Trusted third-party organization or company that issues digital certificates