MIS 200 Exam 3 Herfurth

studied byStudied by 292 people
5.0(3)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 83

flashcard set

Earn XP

Description and Tags

84 Terms

1
the cloud
elastic leasing of pooled computer resources over the internet
New cards
2
Computer Network
a system that connects computers and other devices via communications media so that data and information can be transmitted among them
New cards
3
LAN
Local area network; computers connected at a single physical site
New cards
4
WAN
Wide Area Network; computers connected between two or more separated sites
New cards
5
Intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
New cards
6
Extranet
a network configuration that allows selected outside organizations to access internal information systems
New cards
7
IP address
A number that uniquely identifies each computer or device connected to the Internet.
New cards
8
URL
An easy-to-remember address for calling a web page (like www.code.org).
New cards
9
HTTPS protocol
uses http in conjunction with the SSL/TLS protocol to provide secure communication
New cards
10
VPN
using the public internet to build a secure, private network connecting distant locations
New cards
11
resource elasticity
automatically adjust resources for unpredictable demand
New cards
12
Pooled computer resources
organizations share same physical hardware through virtualization so the cost decreases
New cards
13
Why many organizations are moving to the cloud V.S. why they are not
ARE: lower costs, ubiquitous access, improved scalability, elasticity, virtualization technology, internet-based standards enable flexible & standardized processing capabilities
ARE NOT: when law or standard industry practive require physical control or possession of the data, financial institutions are legally required to maintain physical control over their data
New cards
14
When is VPN used
when you need to remote into the local area network of wherever you need to be
New cards
15
Net Neutrality
the principle that all Internet traffic should be treated equally by Internet Service Providers.
New cards
16
Capital
the investment of resources for future profit
New cards
17
Social media
IT for sharing content amoung networks of users, enables communities of practice
New cards
18
Social capital
social relations with expectation of marketplace returns
New cards
19
Revenue models
Advertising, subscriptions, transaction fees, sales, and affiliate revenue.
New cards
20
Geofencing
location service allowing applications to know when a user has crossed a virtual fence
New cards
21
conversion rate
Frequency someone clicks on ad makes a purchase, "likes" a site, or takes some other action desired by advertiser
New cards
22
vanity metrics
things that dont matter, not tied to organizations strategy or values
New cards
23
Key performance indicators (KPIs)
The quantifiable metrics a company uses to evaluate progress toward critical success factors
New cards
24
success metrics
measurements to track performance toward goals
New cards
25
Social media provider vs. social media user
Providers: facebook, google, linkedin, twitter, etc. attracting demographic groups
Users: individuals and organizations
New cards
26
benefits of social media for organizations
customers can have a direct relationship with the products, organizations can get the word out there
New cards
27
pros vs. cons of problem solving via social media
leaving it, respond to it, or delete it; can be pros and cons to all
New cards
28
value of social capital
number of relationships, strength of relationships, and resources controlled; information, influence, social credentials, personal reinforcement
New cards
29
determining the best revenue model for an organization
advertising, freemium, sales; whichever makes more sense for the organization
New cards
30
how social media fits into organizational strategy
social media changes the balance of power amoung users, communities, and organizations
New cards
31
role of social media in value chain activities
value chains determine business processes, processes determine SMIS requirements, dynamic process flows cannot be designed or diagrammed
New cards
32
threat
can come in different ways, hackers, natural disasters, etc.
New cards
33
vulnerability
threats attack vunerabilities, somewhere a threat could attack
New cards
34
target
aim for money or information, most of the time ends in loss
New cards
35
pretexting
someone pretends to be someone else
New cards
36
sniffing
technique for intercepting computer communications
New cards
37
spoofing
another term for someone pretending to be someone else
New cards
38
phishing
a similar technique for obtaining unauthorized data that uses pretexting via email
New cards
39
hacking
breaking into computers, servers, or networks to steal data
New cards
40
denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
New cards
41
human safeguard
steps taken to protect against security threats by establishing appropriate procedures for users to follow for system use
New cards
42
technical safeguard
identification and authorization, encryption, firewalls, malware protection, application design
New cards
43
cookie
a small text file that a web server stores on your computer
New cards
44
packet-filtering firewall
examines each part of a message and determines whether to let that part pass
New cards
45
Malware
software that is intended to damage or disable computers and computer systems.
New cards
46
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
New cards
47
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
New cards
48
identification vs. authentication
identification - identifies the user
authentication - authenticates the user (password, PIN, smart cards, biometric auth.)
New cards
49
threat/loss scenario illustration
knowt flashcard image
New cards
50
types of security loss and examples of each
  1. Unauthorized data disclosure - people gaining access to data they should and being able to sell it

  2. Incorrect data modification - changing data in a companies database

  3. Faulty service - making services not work

  4. Denial of Service - service doesnt work because of an attack or human error

  5. Loss of infastructure - physical hardware or software goes down

New cards
51
common motivations behind hacking
information, money
New cards
52
how DoS works
Human error - inadvertently shut down a web server or corporate gateway router (black friday too many ppl on website)
Malicious hacker intentionally floods a web server with millions of bogus requests to prevent legitamite traffic from getting through
New cards
53
Types of security threats
unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure
New cards
54
Types of IS security safeguards
technical safeguards, data safeguards, and human safeguards
New cards
55
how organizations decide to manage IS risk
having a plan in place, centralized reporting, specific responses (speed, perparation, dont make the problem worse), practice
New cards
56
How does encryption work?
transforming clear text into coded, unintelligible text for secure storage or communication
New cards
57
How do firewalls work?
computing device that prevents unauthorized access
New cards
58
when and how human safeguards are used in IS security
dissemination and enforcement to train employees on computer safety, termination, being aware of security protocalls, account management, password management, help desk policies
New cards
59
when and how technical safeguards are used in IS security
logging into a system using authentication, knowing https is safe, ecryption when you dont want someone to see your message, firewalls so someone cant get passed and get into the network
New cards
60
BI systems
information systems that process operational and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers
New cards
61
Data warehouse
obtain data, cleanse data, organize and relate data, catalog data
New cards
62
data mart
contains a subset of data warehouse information
New cards
63
Metadata
data that describes other data
New cards
64
Knowledge management
finding the right information, keeping the information in a readily accessible place, and making the information known to everyone in the firm
New cards
65
content management systems
support management and delivery of documents, other expressions of employee knowledge
New cards
66
artificial intelligence
The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal
New cards
67
Weak AI vs. Strong AI
weak: focused on completing a single specific taks
strong: can complete all of the same tasks a human can
New cards
68
Turing Test
Alan Turing said a machine could be considered intelligent if a human could have a conversation with it and not be able to tell if it was a machine or a human
New cards
69
Tasks of BI Systems
informing, deciding, problem solving, and project management
New cards
70
Three primary activities in the BI process
acquire data, perform analysis, publish results
New cards
71
data acquisition options
New cards
72
Three types of BI analysis
reporting, data mining, BigData
New cards
73
how data mining works and why we do it
use sophisticated statistical techniques to find patterns and relationships
New cards
74
Push vs Pull Publishing
Push happens automatically, pull the knowledge workers have to ask for it
New cards
75
Static vs Dynamic reports
static: prepped once from the underlying data
dynamic: at the time of creation, the reporting system reads the most current data and generates the report using the new data
New cards
76
elements of a BI system
knowt flashcard image
New cards
77
role of humans interacting with BI
New cards
78
potential impact of artificial intelligence on the job market
New cards
79
CONCAT
join two or more text strings into one string
New cards
80
COUNTIF/COUNTIFS
Counts the number of cells within a range that meet the given condition
New cards
81
SUMIF/SUMIFS
Adds the cells specified by a given condition or criteria.
New cards
82
AVERAGEIF/AVERAGEIFS
Finds average(arithmetic mean) for the cells specified by a given condition or criteria.
New cards
83
sparklines
small graphs used to represent a series of data; show trends in a series of values, economic cycles, or highlight max or min values
New cards
84
Importance of KPIs
KPIs are often depicted as dashboards with graphs/charts for an at-a-glance status report
New cards
robot