Business Intelligence and Information Systems Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts related to Business Intelligence, Information Security, Systems Development Life Cycle, and Information Systems Management.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

46 Terms

1
New cards

Business Intelligence (BI)

The core purpose of BI is to provide insights to support better decisions.

2
New cards

Data Warehouse

A central repository of historical, subject-oriented data.

3
New cards

Data Mart

A miniature warehouse for one department.

4
New cards

3Vs of Big Data

Volume, Velocity, Variety are collectively known as the main challenges of massive datasets.

5
New cards

Dashboard in BI

A visual display of key metrics at a glance.

6
New cards

Data Cleansing

The process that ensures data are accurate, consistent, and free of errors.

7
New cards

Predictive Analytics

Estimates future outcomes using historical data.

8
New cards

Anomaly in BI

A value that deviates significantly from the norm typically indicating fraud or errors.

9
New cards

Metadata

Data about data; includes definitions, formats, and lineage of data assets.

10
New cards

Clustering Analysis

Segmenting customers by purchasing habits.

11
New cards

Data Governance

The policies and roles that ensure data quality and security.

12
New cards

BI Scorecard

Tracks progress against predefined objectives; differs from a dashboard.

13
New cards

Self-Service BI

Empowers end users to create their own ad-hoc reports and visualizations.

14
New cards

Single Version of the Truth

Consistent, agreed-upon definitions for key metrics to avoid conflicting numbers.

15
New cards

Natural Language Querying

Allows users to ask questions in everyday language within BI tools.

16
New cards

Ethical BI Practice

Requires attention to data privacy and bias mitigation.

17
New cards

Data Lake

A storage repository that holds vast amounts of raw data in its native format.

18
New cards

CIA Triad

Refers to Confidentiality, Integrity, and Availability in information security.

19
New cards

Phishing

A form of social engineering where attackers manipulate trust to steal information.

20
New cards

Multi-Factor Authentication (MFA)

Increases security by requiring two different kinds of proof.

21
New cards

Vulnerability

A weakness that can be exploited by a threat.

22
New cards

Ransomware

Malware designed to demand payment to restore access.

23
New cards

Firewall

A network security device that controls network traffic between trust zones.

24
New cards

Incident Response Plan

A plan that outlines roles and communication steps during a security incident.

25
New cards

Patch in Security

An update that fixes software flaws.

26
New cards

Defense-in-Depth

Multiple, overlapping layers of protection to enhance security.

27
New cards

Personally Identifiable Information (PII)

Data that can identify an individual and requires special protection.

28
New cards

Botnet

A network of compromised computers under central control.

29
New cards

Denial-of-Service (DoS) Attack

Targets the availability of a system by overwhelming it with traffic.

30
New cards

Risk

Conceptually expressed as Threat × Vulnerability × Impact.

31
New cards

VPN (Virtual Private Network)

Creates an encrypted tunnel over public networks for secure remote connections.

32
New cards

Systems Development Life Cycle (SDLC)

The process of creating and maintaining information systems.

33
New cards

Gantt Chart

A visual tool that shows task durations and dependencies over time.

34
New cards

User Acceptance Testing (UAT)

Occurs just prior to go-live to validate that the system meets business needs.

35
New cards

Change Control Processes

Help evaluate and approve modifications systematically.

36
New cards

Stakeholder Analysis

Identifies all parties affected, their interests and influence.

37
New cards

Agile Methods

Focus on iterative, incremental delivery with continual feedback.

38
New cards

Earned Value Management (EVM)

Compares planned work vs. work completed and costs spent.

39
New cards

Information Systems (IS)

Combines people, technology, and processes to collect, process, and distribute information.

40
New cards

Management Information Systems (MIS)

Supply tactical and strategic reports to managers.

41
New cards

Enterprise Resource Planning (ERP)

Aims to integrate key business processes into one unified platform.

42
New cards

Customer Relationship Management (CRM)

Focuses on optimizing customer interactions and loyalty.

43
New cards

Decision Support Systems (DSS)

Helps managers evaluate complex options with analytical models.

44
New cards

Cloud Computing

Offers on-demand, scalable resources billed as utilities.

45
New cards

Identity & Access Management (IAM)

Centralizes user authentication and permissions.

46
New cards

MIS Initiatives

Success is measured by how well they support organizational goals and strategy.