Business Intelligence and Information Systems Exam Review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/187

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to Business Intelligence, Information Systems, Data Management, and Project Management as discussed in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

188 Terms

1
New cards

Business Intelligence (BI)

Provides insights to support better decisions.

2
New cards

Data Warehouse

Central repository of historical, subject-oriented data.

3
New cards

Data Mart

A miniature warehouse for one department.

4
New cards

The 3 Vs of Big Data

Volume, Velocity, Variety summarizing challenges of massive datasets.

5
New cards

Dashboard

A visual display of key metrics at a glance.

6
New cards

Data Cleansing

Ensures that data are accurate, consistent, and free of errors.

7
New cards

Predictive Analytics

Estimates future outcomes.

8
New cards

Anomaly

A value that deviates significantly from the norm.

9
New cards

Evidence-Based Decisions

Ability to make faster, evidence-based decisions.

10
New cards

Metadata

Data about data, providing definitions and formats.

11
New cards

Clustering Analysis

Segmenting customers by purchasing habits.

12
New cards

Data Governance

Policies and roles ensuring data quality and security.

13
New cards

BI Scorecard

Tracks progress against predefined objectives.

14
New cards

Self-Service BI

Empowers end users to build their own ad-hoc reports.

15
New cards

Single Version of the Truth

Consistent, agreed-upon definitions for key metrics.

16
New cards

Insight Dissemination

Sharing results in a form people can consume.

17
New cards

Natural Language Querying

Allows asking questions in everyday language.

18
New cards

Ethical BI Practice

Attention to data privacy and bias mitigation.

19
New cards

Data Lake

Store raw, varied data for later analysis.

20
New cards

BI Initiatives Success Measurement

Measured chiefly by improved business decisions.

21
New cards

Power BI

A tool for creating interactive data visualizations.

22
New cards

Power BI Cloud Reporting

Allows access and interaction with visuals via a web browser.

23
New cards

Row-Level Security (RLS)

Restrict data rows a viewer can see based on their role.

24
New cards

Get Data

Connect to diverse sources such as Excel or SQL.

25
New cards

Fields Pane in Power BI

Shows available tables and columns for visuals.

26
New cards

Automatic Data Refresh

Keeps reports synchronized with the latest source data.

27
New cards

Power BI Dashboard

Single-page summaries that can mix tiles from various reports.

28
New cards

Filter Pane in Reports

Limits the displayed data according to chosen criteria.

29
New cards

Themes in Power BI

Ensuring consistent color and font style across visuals.

30
New cards

Power BI Workspaces

Organize related reports, datasets, and dashboards with access control.

31
New cards

Import Mode in Power BI

Data is stored in memory for fast querying.

32
New cards

DirectQuery

Queries executed on the source system in real-time.

33
New cards

Power BI Mobile App

View and interact with dashboards on mobile devices.

34
New cards

Power BI Bookmarks

Captures saved views for storytelling.

35
New cards

Primary Purpose of Power Query

Transform and shape data before entering the model.

36
New cards

Sharing in Power BI

Granting view privileges to selected colleagues.

37
New cards

Power BI's Q&A Visual

Allows asking natural language questions to generate visuals.

38
New cards

Properly Designed Data Model

Follows star or snowflake principles for clarity and performance.

39
New cards

Gateway Installation Unnecessary

When all data sources are cloud-based.

40
New cards

CIA Triad

Confidentiality, Integrity, and Availability.

41
New cards

Phishing

A form of social engineering to deceive users.

42
New cards

Multi-Factor Authentication (MFA)

Requires two types of proof to enhance security.

43
New cards

Vulnerability

A weakness that could be exploited by a threat.

44
New cards

Ransomware

Malware demanding payment to restore access.

45
New cards

Encryption

Protects data by rendering it unreadable without a key.

46
New cards

Firewall Function

Controls network traffic between trust zones.

47
New cards

Security Awareness Training

Reduces human error-driven incidents.

48
New cards

Incident Response Plan

Establish clear roles and communication steps.

49
New cards

Patch in Security

An update that fixes software flaws.

50
New cards

Defense-in-Depth

Multiple layers of protection to reduce risks.

51
New cards

Personally Identifiable Information (PII)

Data that uniquely identifies an individual.

52
New cards

Botnet Definition

A network of compromised computers under central control.

53
New cards

Integrity Breaches

Unauthorized alteration of data.

54
New cards

DoS Attack

Targets Availability by flooding resources.

55
New cards

Security Logs Importance

Provide evidence for detecting incidents.

56
New cards

Risk Conceptual Expression

Threat × Vulnerability × Impact.

57
New cards

HIPAA Purpose

Protects health information security and privacy.

58
New cards

VPN Purpose

Secures remote connections with an encrypted tunnel.

59
New cards

Basic Security Risk Assessment Step

Identify and value critical assets.

60
New cards

Systems Development

Creating and maintaining information systems.

61
New cards

SDLC First Formal Phase

Defining goals, scope, and feasibility.

62
New cards

Requirements Gathering Purpose

Capture user needs for system functionality.

63
New cards

Prototype Use

Provides a tangible model for user feedback.

64
New cards

Feasibility Analysis

Examines operational feasibility and fit.

65
New cards

Parallel Conversion

Running old and new systems side by side during transition.

66
New cards

Gantt Chart Function

Visualizes task durations and dependencies.

67
New cards

User Acceptance Testing (UAT) Timing

Just prior to go-live to validate system functionality.

68
New cards

Maintenance Activities

Includes fixing defects and adding features.

69
New cards

Scope Creep Definition

Uncontrolled addition of new features or requirements.

70
New cards

Agile Methods Focus

Iterative, incremental delivery with continual feedback.

71
New cards

Work Breakdown Structure (WBS) Purpose

Organizes tasks into a hierarchical decomposition.

72
New cards

Use Case Diagram Purpose

Captures interactions between actors and the system.

73
New cards

Plunge Conversion Risk

High risk but low cost.

74
New cards

Version Control Systems Purpose

Track changes and collaborate on source code.

75
New cards

Testing Goal in SDLC

Discover and correct defects before release.

76
New cards

Stakeholder Analysis Purpose

Identifies all parties affected and their interests.

77
New cards

Functional Requirements Definition

Describes what the system must do.

78
New cards

Change Control Processes Importance

Evaluates and approves modifications systematically.

79
New cards

Successful SDLC Project Evaluation

Judged on meeting scope, time, cost, and quality objectives.

80
New cards

Triple Constraint

Balances scope, time, and cost.

81
New cards

Critical Path Definition

Tasks with zero float that delay the entire project.

82
New cards

PERT Charts Usage

Estimating project duration using time estimates.

83
New cards

Risk Mitigation Definition

Taking actions to reduce probability or impact.

84
New cards

Stakeholder Register Usage

Documents individuals/groups and their interest/influence.

85
New cards

Earned Value Management (EVM) Purpose

Compares planned work versus work completed.

86
New cards

Fast Tracking Definition

Compressing schedule by overlapping tasks.

87
New cards

Crashing Definition

Shortening schedule by allocating extra resources.

88
New cards

Change Request Evaluation Importance

Analyze the impact on project constraints.

89
New cards

Lessons Learned Documentation Timing

Produced during project closure.

90
New cards

Information System (IS) Definition

Combines people, technology, and processes to manage information.

91
New cards

Management Information Systems (MIS) Purpose

Supply reports to support decision-making.

92
New cards

ERP System Aim

Integrate key business processes into one platform.

93
New cards

CRM System Purpose

Optimize customer interactions and loyalty.

94
New cards

Decision Support Systems (DSS) Features

Supports complex decision evaluation using analytical models.

95
New cards

Supply Chain Management (SCM) Software Purpose

Coordinates flow from suppliers to customers.

96
New cards

Cloud Computing Benefits

On-demand, scalable resources billed as utilities.

97
New cards

Identity & Access Management (IAM) Purpose

Centralizes user authentication and permissions.

98
New cards

IS Department Responsibility

Protect information assets with cybersecurity controls.

99
New cards

Value of MIS Initiatives Measurement

How well they support organizational goals.

100
New cards

Five Components of an Information System

Hardware, software, data, procedures, people.