1/100
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Business Intelligence (BI)
Tools to analyze and report past data. (Ch6)
Advanced Data Analytics
Tools to explain and predict outcomes using data. (Ch6)
Big Data
Extremely large, complex datasets difficult to process. (Ch6)
3 V’s of Big Data
Volume: Amount of data generated. (Ch6)
Variety: Different types of data formats. (Ch6)
Velocity: Speed of data generation. (Ch6)
Relational Database
Structured data stored in tables. (Ch6)
NoSQL (No Structured Query Language)
Database for unstructured or flexible data. (Ch6)
OLTP (Online Transaction Processing)
Processes real-time transactions. (Ch6)
OLAP (Online Analytical Processing)
Analyzes historical data for decisions. (Ch6)
Data Warehouse
Stores structured data for analysis. (Ch6)
Data Lake
Stores raw structured and unstructured data. (Ch6)
ETL (Extraction, Transformation, Loading)
Process of moving data into warehouse. (Ch6)
Data Mart
Smaller, focused data warehouse. (Ch6)
Data Mining
Finding patterns and relationships in data. (Ch6)
Association Discovery
Finds items occurring together. (Ch6)
Classification
Assigns data to predefined categories. (Ch6)
Clustering
Groups similar data without labels. (Ch6)
Prediction
Forecasts future outcomes. (Ch6)
Artificial Intelligence (AI)
Machines simulating human intelligence. (Ch6)
Machine Learning (ML)
Systems learning patterns from data. (Ch6)
Neural Networks
Brain-like systems processing data in layers. (Ch6)
Chatbot
AI system simulating human conversation. (Ch6)
Business Process
Sequence of activities to achieve a goal. (Ch7)
Core Business Processes
Essential processes generating revenue. (Ch7)
Order-to-Cash
Process from sale to receiving payment. (Ch7)
Procure-to-Pay
Process from purchasing to payment. (Ch7)
Make-to-Stock
Producing goods based on forecasts. (Ch7)
Make-to-Order
Producing goods after order received. (Ch7)
Value Chain
Activities adding value to products/services. (Ch7)
Enterprise System
Integrated system connecting business processes. (Ch7)
Information Silos
Systems where data is not shared. (Ch7)
Best-of-Breed
Using separate systems for each function. (Ch7)
BPM (Business Process Management)
Continuous process improvement. (Ch7)
BPR (Business Process Reengineering)
Radical redesign of processes. (Ch7)
ERP (Enterprise Resource Planning)
System integrating all business resources. (Ch7)
CRM (Customer Relationship Management)
Strategy to manage customer relationships. (Ch8 overlap)
Supply Chain
Network moving products to customers. (Ch8)
SCM (Supply Chain Management)
Managing flow of goods and information. (Ch8)
SCMS (Supply Chain Management System)
Technology supporting supply chain processes. (Ch8)
B2B (Business-to-Business)
Transactions between businesses. (Ch8)
EDI (Electronic Data Interchange)
Electronic exchange of business documents. (Ch8)
Portal
Secure access point for business information. (Ch8)
B2B Marketplace
Platform connecting many buyers and sellers. (Ch8)
JIT (Just-in-Time)
Inventory arrives when needed. (Ch8)
VMI (Vendor-Managed Inventory)
Vendor manages inventory levels. (Ch8)
Bullwhip Effect
Demand errors amplified across supply chain. (Ch8)
Product Flow
Movement of goods. (Ch8)
Information Flow
Movement of data. (Ch8)
Financial Flow
Movement of money. (Ch8)
RFID (Radio Frequency Identification)
Technology tracking products. (Ch8)
Blockchain
Secure, decentralized digital ledger. (Ch8)
CRMS (Customer Relationship Management System)
System managing customer interactions. (Ch8)
Operational CRM
Supports daily customer interactions. (Ch8)
Analytical CRM
Analyzes customer data. (Ch8)
Collaborative CRM
Shares customer data across departments. (Ch8)
Information Asset
Data or resources needing protection. (Ch10)
Weakness
Flaw in system design or implementation. (Ch10)
Vulnerability
Exploitable weakness. (Ch10)
Threat
Potential danger exploiting vulnerabilities. (Ch10)
Attack
Actions exploiting vulnerabilities. (Ch10)
Attack Vector
Method used to exploit vulnerability. (Ch10)
Attack Payload
Malicious code delivered in attack. (Ch10)
Attack Surface
All possible entry points for attacks. (Ch10)
Mitigation
Strategies to reduce or prevent attacks. (Ch10)
Malware
Software designed to harm systems. (Ch10)
Virus
Program disrupting system operations. (Ch10)
Worm
Self-spreading malware. (Ch10)
Trojan Horse
Malware disguised as legitimate software. (Ch10)
Ransomware
Locks data and demands payment. (Ch10)
Logic Bomb
Malicious code triggered by event. (Ch10)
DoS (Denial of Service)
Attack preventing system access. (Ch10)
Spyware
Software secretly collecting data. (Ch10)
Spam
Unwanted electronic messages. (Ch10)
Botnet
Network of infected devices controlled by attacker. (Ch10)
Identity Theft
Stealing personal information. (Ch10)
Availability
System accessible to authorized users. (Ch10)
Integrity
Data accuracy and protection. (Ch10)
Confidentiality
Data protection from unauthorized access. (Ch10)
Accountability
Actions traceable to users. (Ch10)
Authentication
Verifying identity. (Ch10)
Authorization
Granting access permissions. (Ch10)
Firewall
System controlling network traffic. (Ch10)
Encryption
Converting data into unreadable form. (Ch10)
SMAC
Social, Mobile, Analytics, Cloud technologies. (DX)
Digitization
Converting analog data to digital. (DX)
Digitalization
Using digital tech to improve processes. (DX)
Digital Transformation (DX)
Using digital tech to create new business models. (DX)
Nexus of Forces
Convergence of SMAC technologies. (DX)
Generative Technology
Flexible tech enabling innovation. (DX)
Sterile Technology
Fixed-purpose technology. (DX)
Data Volume
Amount of data generated. (DX)
Data Variety
Different types of data. (DX)
Data Velocity
Speed of data creation. (DX)
Data Veracity
Accuracy and reliability of data. (DX)
Data Volatility
Lifespan of data value. (DX)
Cloud Computing
Delivering services over internet. (DX)
IaaS (Infrastructure as a Service)
Provides computing infrastructure. (DX)
PaaS (Platform as a Service)
Provides development environment. (DX)
SaaS (Software as a Service)
Provides software via internet. (DX)
Digital Connectivity
Linking people, devices, and systems. (DX)
Network Effect
Value increases with more users. (DX)