MIS Exam #3 Concepts ( CHAPTERS 6-10)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:24 AM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

101 Terms

1
New cards

Business Intelligence (BI)

Tools to analyze and report past data. (Ch6)

2
New cards

Advanced Data Analytics

Tools to explain and predict outcomes using data. (Ch6)

3
New cards

Big Data

Extremely large, complex datasets difficult to process. (Ch6)

4
New cards

3 V’s of Big Data

Volume: Amount of data generated. (Ch6)

Variety: Different types of data formats. (Ch6)

Velocity: Speed of data generation. (Ch6)

5
New cards

Relational Database

Structured data stored in tables. (Ch6)

6
New cards

NoSQL (No Structured Query Language)

Database for unstructured or flexible data. (Ch6)

7
New cards

OLTP (Online Transaction Processing)

Processes real-time transactions. (Ch6)

8
New cards

OLAP (Online Analytical Processing)

Analyzes historical data for decisions. (Ch6)

9
New cards

Data Warehouse

Stores structured data for analysis. (Ch6)

10
New cards

Data Lake

Stores raw structured and unstructured data. (Ch6)

11
New cards

ETL (Extraction, Transformation, Loading)

Process of moving data into warehouse. (Ch6)

12
New cards

Data Mart

Smaller, focused data warehouse. (Ch6)

13
New cards

Data Mining

Finding patterns and relationships in data. (Ch6)

14
New cards

Association Discovery

Finds items occurring together. (Ch6)

15
New cards

Classification

Assigns data to predefined categories. (Ch6)

16
New cards

Clustering

Groups similar data without labels. (Ch6)

17
New cards

Prediction

Forecasts future outcomes. (Ch6)

18
New cards

Artificial Intelligence (AI)

Machines simulating human intelligence. (Ch6)

19
New cards

Machine Learning (ML)

Systems learning patterns from data. (Ch6)

20
New cards

Neural Networks

Brain-like systems processing data in layers. (Ch6)

21
New cards

Chatbot

AI system simulating human conversation. (Ch6)

22
New cards

Business Process

Sequence of activities to achieve a goal. (Ch7)

23
New cards

Core Business Processes

Essential processes generating revenue. (Ch7)

24
New cards

Order-to-Cash

Process from sale to receiving payment. (Ch7)

25
New cards

Procure-to-Pay

Process from purchasing to payment. (Ch7)

26
New cards

Make-to-Stock

Producing goods based on forecasts. (Ch7)

27
New cards

Make-to-Order

Producing goods after order received. (Ch7)

28
New cards

Value Chain

Activities adding value to products/services. (Ch7)

29
New cards

Enterprise System

Integrated system connecting business processes. (Ch7)

30
New cards

Information Silos

Systems where data is not shared. (Ch7)

31
New cards

Best-of-Breed

Using separate systems for each function. (Ch7)

32
New cards

BPM (Business Process Management)

Continuous process improvement. (Ch7)

33
New cards

BPR (Business Process Reengineering)

Radical redesign of processes. (Ch7)

34
New cards

ERP (Enterprise Resource Planning)

System integrating all business resources. (Ch7)

35
New cards

CRM (Customer Relationship Management)

Strategy to manage customer relationships. (Ch8 overlap)

36
New cards

Supply Chain

Network moving products to customers. (Ch8)

37
New cards

SCM (Supply Chain Management)

Managing flow of goods and information. (Ch8)

38
New cards

SCMS (Supply Chain Management System)

Technology supporting supply chain processes. (Ch8)

39
New cards

B2B (Business-to-Business)

Transactions between businesses. (Ch8)

40
New cards

EDI (Electronic Data Interchange)

Electronic exchange of business documents. (Ch8)

41
New cards

Portal

Secure access point for business information. (Ch8)

42
New cards

B2B Marketplace

Platform connecting many buyers and sellers. (Ch8)

43
New cards

JIT (Just-in-Time)

Inventory arrives when needed. (Ch8)

44
New cards

VMI (Vendor-Managed Inventory)

Vendor manages inventory levels. (Ch8)

45
New cards

Bullwhip Effect

Demand errors amplified across supply chain. (Ch8)

46
New cards

Product Flow

Movement of goods. (Ch8)

47
New cards

Information Flow

Movement of data. (Ch8)

48
New cards

Financial Flow

Movement of money. (Ch8)

49
New cards

RFID (Radio Frequency Identification)

Technology tracking products. (Ch8)

50
New cards

Blockchain

Secure, decentralized digital ledger. (Ch8)

51
New cards

CRMS (Customer Relationship Management System)

System managing customer interactions. (Ch8)

52
New cards

Operational CRM

Supports daily customer interactions. (Ch8)

53
New cards

Analytical CRM

Analyzes customer data. (Ch8)

54
New cards

Collaborative CRM

Shares customer data across departments. (Ch8)

55
New cards

Information Asset

Data or resources needing protection. (Ch10)

56
New cards

Weakness

Flaw in system design or implementation. (Ch10)

57
New cards

Vulnerability

Exploitable weakness. (Ch10)

58
New cards

Threat

Potential danger exploiting vulnerabilities. (Ch10)

59
New cards

Attack

Actions exploiting vulnerabilities. (Ch10)

60
New cards

Attack Vector

Method used to exploit vulnerability. (Ch10)

61
New cards

Attack Payload

Malicious code delivered in attack. (Ch10)

62
New cards

Attack Surface

All possible entry points for attacks. (Ch10)

63
New cards

Mitigation

Strategies to reduce or prevent attacks. (Ch10)

64
New cards

Malware

Software designed to harm systems. (Ch10)

65
New cards

Virus

Program disrupting system operations. (Ch10)

66
New cards

Worm

Self-spreading malware. (Ch10)

67
New cards

Trojan Horse

Malware disguised as legitimate software. (Ch10)

68
New cards

Ransomware

Locks data and demands payment. (Ch10)

69
New cards

Logic Bomb

Malicious code triggered by event. (Ch10)

70
New cards

DoS (Denial of Service)

Attack preventing system access. (Ch10)

71
New cards

Spyware

Software secretly collecting data. (Ch10)

72
New cards

Spam

Unwanted electronic messages. (Ch10)

73
New cards

Botnet

Network of infected devices controlled by attacker. (Ch10)

74
New cards

Identity Theft

Stealing personal information. (Ch10)

75
New cards

Availability

System accessible to authorized users. (Ch10)

76
New cards

Integrity

Data accuracy and protection. (Ch10)

77
New cards

Confidentiality

Data protection from unauthorized access. (Ch10)

78
New cards

Accountability

Actions traceable to users. (Ch10)

79
New cards

Authentication

Verifying identity. (Ch10)

80
New cards

Authorization

Granting access permissions. (Ch10)

81
New cards

Firewall

System controlling network traffic. (Ch10)

82
New cards

Encryption

Converting data into unreadable form. (Ch10)

83
New cards

SMAC

Social, Mobile, Analytics, Cloud technologies. (DX)

84
New cards

Digitization

Converting analog data to digital. (DX)

85
New cards

Digitalization

Using digital tech to improve processes. (DX)

86
New cards

Digital Transformation (DX)

Using digital tech to create new business models. (DX)

87
New cards

Nexus of Forces

Convergence of SMAC technologies. (DX)

88
New cards

Generative Technology

Flexible tech enabling innovation. (DX)

89
New cards

Sterile Technology

Fixed-purpose technology. (DX)

90
New cards

Data Volume

Amount of data generated. (DX)

91
New cards

Data Variety

Different types of data. (DX)

92
New cards

Data Velocity

Speed of data creation. (DX)

93
New cards

Data Veracity

Accuracy and reliability of data. (DX)

94
New cards

Data Volatility

Lifespan of data value. (DX)

95
New cards

Cloud Computing

Delivering services over internet. (DX)

96
New cards

IaaS (Infrastructure as a Service)

Provides computing infrastructure. (DX)

97
New cards

PaaS (Platform as a Service)

Provides development environment. (DX)

98
New cards

SaaS (Software as a Service)

Provides software via internet. (DX)

99
New cards

Digital Connectivity

Linking people, devices, and systems. (DX)

100
New cards

Network Effect

Value increases with more users. (DX)