1/187
These flashcards cover key concepts related to Business Intelligence, Information Systems, Data Management, and Project Management as discussed in the lecture.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Business Intelligence (BI)
Provides insights to support better decisions.
Data Warehouse
Central repository of historical, subject-oriented data.
Data Mart
A miniature warehouse for one department.
The 3 Vs of Big Data
Volume, Velocity, Variety summarizing challenges of massive datasets.
Dashboard
A visual display of key metrics at a glance.
Data Cleansing
Ensures that data are accurate, consistent, and free of errors.
Predictive Analytics
Estimates future outcomes.
Anomaly
A value that deviates significantly from the norm.
Evidence-Based Decisions
Ability to make faster, evidence-based decisions.
Metadata
Data about data, providing definitions and formats.
Clustering Analysis
Segmenting customers by purchasing habits.
Data Governance
Policies and roles ensuring data quality and security.
BI Scorecard
Tracks progress against predefined objectives.
Self-Service BI
Empowers end users to build their own ad-hoc reports.
Single Version of the Truth
Consistent, agreed-upon definitions for key metrics.
Insight Dissemination
Sharing results in a form people can consume.
Natural Language Querying
Allows asking questions in everyday language.
Ethical BI Practice
Attention to data privacy and bias mitigation.
Data Lake
Store raw, varied data for later analysis.
BI Initiatives Success Measurement
Measured chiefly by improved business decisions.
Power BI
A tool for creating interactive data visualizations.
Power BI Cloud Reporting
Allows access and interaction with visuals via a web browser.
Row-Level Security (RLS)
Restrict data rows a viewer can see based on their role.
Get Data
Connect to diverse sources such as Excel or SQL.
Fields Pane in Power BI
Shows available tables and columns for visuals.
Automatic Data Refresh
Keeps reports synchronized with the latest source data.
Power BI Dashboard
Single-page summaries that can mix tiles from various reports.
Filter Pane in Reports
Limits the displayed data according to chosen criteria.
Themes in Power BI
Ensuring consistent color and font style across visuals.
Power BI Workspaces
Organize related reports, datasets, and dashboards with access control.
Import Mode in Power BI
Data is stored in memory for fast querying.
DirectQuery
Queries executed on the source system in real-time.
Power BI Mobile App
View and interact with dashboards on mobile devices.
Power BI Bookmarks
Captures saved views for storytelling.
Primary Purpose of Power Query
Transform and shape data before entering the model.
Sharing in Power BI
Granting view privileges to selected colleagues.
Power BI's Q&A Visual
Allows asking natural language questions to generate visuals.
Properly Designed Data Model
Follows star or snowflake principles for clarity and performance.
Gateway Installation Unnecessary
When all data sources are cloud-based.
CIA Triad
Confidentiality, Integrity, and Availability.
Phishing
A form of social engineering to deceive users.
Multi-Factor Authentication (MFA)
Requires two types of proof to enhance security.
Vulnerability
A weakness that could be exploited by a threat.
Ransomware
Malware demanding payment to restore access.
Encryption
Protects data by rendering it unreadable without a key.
Firewall Function
Controls network traffic between trust zones.
Security Awareness Training
Reduces human error-driven incidents.
Incident Response Plan
Establish clear roles and communication steps.
Patch in Security
An update that fixes software flaws.
Defense-in-Depth
Multiple layers of protection to reduce risks.
Personally Identifiable Information (PII)
Data that uniquely identifies an individual.
Botnet Definition
A network of compromised computers under central control.
Integrity Breaches
Unauthorized alteration of data.
DoS Attack
Targets Availability by flooding resources.
Security Logs Importance
Provide evidence for detecting incidents.
Risk Conceptual Expression
Threat × Vulnerability × Impact.
HIPAA Purpose
Protects health information security and privacy.
VPN Purpose
Secures remote connections with an encrypted tunnel.
Basic Security Risk Assessment Step
Identify and value critical assets.
Systems Development
Creating and maintaining information systems.
SDLC First Formal Phase
Defining goals, scope, and feasibility.
Requirements Gathering Purpose
Capture user needs for system functionality.
Prototype Use
Provides a tangible model for user feedback.
Feasibility Analysis
Examines operational feasibility and fit.
Parallel Conversion
Running old and new systems side by side during transition.
Gantt Chart Function
Visualizes task durations and dependencies.
User Acceptance Testing (UAT) Timing
Just prior to go-live to validate system functionality.
Maintenance Activities
Includes fixing defects and adding features.
Scope Creep Definition
Uncontrolled addition of new features or requirements.
Agile Methods Focus
Iterative, incremental delivery with continual feedback.
Work Breakdown Structure (WBS) Purpose
Organizes tasks into a hierarchical decomposition.
Use Case Diagram Purpose
Captures interactions between actors and the system.
Plunge Conversion Risk
High risk but low cost.
Version Control Systems Purpose
Track changes and collaborate on source code.
Testing Goal in SDLC
Discover and correct defects before release.
Stakeholder Analysis Purpose
Identifies all parties affected and their interests.
Functional Requirements Definition
Describes what the system must do.
Change Control Processes Importance
Evaluates and approves modifications systematically.
Successful SDLC Project Evaluation
Judged on meeting scope, time, cost, and quality objectives.
Triple Constraint
Balances scope, time, and cost.
Critical Path Definition
Tasks with zero float that delay the entire project.
PERT Charts Usage
Estimating project duration using time estimates.
Risk Mitigation Definition
Taking actions to reduce probability or impact.
Stakeholder Register Usage
Documents individuals/groups and their interest/influence.
Earned Value Management (EVM) Purpose
Compares planned work versus work completed.
Fast Tracking Definition
Compressing schedule by overlapping tasks.
Crashing Definition
Shortening schedule by allocating extra resources.
Change Request Evaluation Importance
Analyze the impact on project constraints.
Lessons Learned Documentation Timing
Produced during project closure.
Information System (IS) Definition
Combines people, technology, and processes to manage information.
Management Information Systems (MIS) Purpose
Supply reports to support decision-making.
ERP System Aim
Integrate key business processes into one platform.
CRM System Purpose
Optimize customer interactions and loyalty.
Decision Support Systems (DSS) Features
Supports complex decision evaluation using analytical models.
Supply Chain Management (SCM) Software Purpose
Coordinates flow from suppliers to customers.
Cloud Computing Benefits
On-demand, scalable resources billed as utilities.
Identity & Access Management (IAM) Purpose
Centralizes user authentication and permissions.
IS Department Responsibility
Protect information assets with cybersecurity controls.
Value of MIS Initiatives Measurement
How well they support organizational goals.
Five Components of an Information System
Hardware, software, data, procedures, people.