accg3005

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

What are the components of SWOT analysis?

Strengths, Weaknesses, Opportunities, Threats.

2
New cards

What are the five forces in Porter's model?

Supplier Power, Threat of New Entrants, Rivalry Among Existing Competitors, Threat of Substitute Products or Services, Buyer Power.

3
New cards

What does PESTLE stand for in strategic analysis?

Political, Economic, Social, Technological, Legal, Environmental.

4
New cards

What factors have propelled the growth of the on-demand economy?

Smartphone-connected consumers, simple and secure purchase flows, location-based services.

5
New cards

How do digital business models create value?

Through engagement with customers via digital channels like websites, social media, and mobile devices.

6
New cards

Name some of the mega trends in IT innovation and disruption.

Connectivity, Big Data and Data Analytics, Digitization, Machine-to-Machine Technology. Acronym: "CBD-M"

7
New cards

What are the characteristics of business processes?

Formal Processes (SOP), Informal Processes, Range (from slow and rigid to fast-moving and adaptive).

8
New cards

What is the focus of Business Process Reengineering?

Continuous examination and elimination of wasted steps in processes, enhanced by digital technology.

9
New cards

What is "The Cloud"?

A general term for infrastructure that uses the Internet and private networks to access, share, and deliver computing resources, characterized by scalable delivery as a service to end-users over a network.

10
New cards

What are the types of Cloud Computing?

  • Private Cloud: Single-tenant environments with stronger security and control for regulated industries and critical data.

  • Public Cloud: Multiple-tenant virtualized services utilizing the same pool of servers across a public network.

11
New cards

What is the value of Cloud Infrastructure?

Cloud infrastructure is dynamic, not static, and provides a way to make apps and computing power available on demand as they are provided as a service (e.g., SaaS like Google Apps).

12
New cards

Differentiate between Data, Information, Knowledge, and Wisdom.

  • Data: Raw facts describing products, customers, events, etc., recorded, classified, and stored.

  • Information: Processed data organized or put into context with meaning and value.

  • Knowledge: Applies understanding, experience, and expertise to current problems.

  • Wisdom: Applies a moral code and prior experiences to form a judgment.

13
New cards

What are the types of Information Systems?

  • Transaction Processing Systems (TPS)

  • Management Information Systems (MIS)

  • Decision Support Systems (DSS)

  • Executive Information Systems (EIS)

14
New cards

What are the benefits of Virtualization?

Memory-intensive, energy-efficient (up to 95% reduction in energy use per server), scalability, and load balancing.

15
New cards

What are the key components of business analytics?

Business analytics involves database technologies, data warehouses, data marts, and active data warehouses (ADW), all of which are integral for processing and analyzing large sets of data to support decision-making.

16
New cards

What is the role of Database Management Systems (DBMS)?

DBMS integrates with data collection systems, providing an organized way to store, access, and manage data. It functions include data filtering, profiling, maintenance, synchronization, security, and access.

17
New cards

What is the importance of data governance in enterprises?

Data governance involves controlling enterprise data through formal policies and procedures, ensuring the data can be trusted, are accessible, and reducing legal risks associated with unmanaged or inconsistently managed information.

18
New cards

Describe the impact of big data on business evolution.

Big data has transformed businesses by enabling more comprehensive and complex analysis, better decision-making, and more personalized customer interactions, contrasting with the limited scope and insights before big data.

19
New cards

What are the characteristics of poor quality or "dirty" data?

Dirty data lacks integrity/validation and reduces user trust. It can be incomplete, outdated, incorrect, duplicated or in conflict, and non-standardized, making it unusable for effective decision-making.

20
New cards

What are the principles of data life cycle and data management?

Key principles include the diminishing value of data over time, the 90/90 data use (90% of data lose value after 90 days), and the importance of data in context, which requires investment in data architecture for actionable information.

21
New cards

What is the basic definition of the Internet?

The Internet is a global network of interconnected computers and servers that share and transmit data using standardized communication protocols.

22
New cards

Describe the evolution from 1G to 5G in mobile networks.

Mobile networks have evolved from 1G (analog voice) to 2G (digital voice and SMS), 3G (mobile data and video calls), 4G (IP-based voice and data services), and 5G (higher data speeds, reduced latency, energy savings, and massive device connectivity).

23
New cards

What is the Internet of Things (IoT)?

The Internet of Things refers to the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

24
New cards

What are the advantages of IoT?

Advantages include monitoring product quality, gaining insights for new products, supporting sales, understanding product use, remote troubleshooting, and efficiently delivering post-sales services.

25
New cards

What is Net Neutrality?

Net neutrality is the principle that Internet service providers should treat all data on the Internet equally, without discriminating or charging differently by user, content, website, platform, or application.

26
New cards

Define Data Privacy

Data privacy refers to the right to self-determine what information about oneself is made accessible to others, for what use or purpose, and when. It's a growing global concern for individuals, organizations, and governments.

27
New cards

What are the four main concerns of data privacy?

  • How data are shared with third parties.

  • How data are collected and stored.

  • How data are used.

  • How data are regulated.

28
New cards

What is a Cyberthreat?

A cyberthreat is a threat posed via the Internet, potentially leading to malicious attempts to damage or disrupt a computer network, system, or application.

29
New cards

 Differentiate between Unintentional and Intentional Cyberthreats.

  • Unintentional threats can be caused by human error, poorly designed systems, or environmental hazards.

  • Intentional threats include hacking, phishing, crimeware, DDoS attacks, insider misuse, and physical theft.

30
New cards

What are some examples of Intentional Cyberthreats?

Examples include spear phishing, crimeware (like malware, spyware, adware, ransomware), botnets, denial of service attacks, and internal threats such as data tampering.

31
New cards

What are key strategies for defending against cyberattacks?

Key strategies include right training, password protection, encrypting and backing up data, conducting regular audits, and considering cyber security insurance.

32
New cards

Define Data Analytics.

Data Analytics is the technique of analyzing a dataset qualitatively or quantitatively to reveal patterns, trends, and associations, often related to human behavior and interaction, to enhance productivity and business gain.

33
New cards

What are the three levels of data analytics?

  • Descriptive analytics: What has happened?

  • Predictive analytics: What could happen?

  • Prescriptive analytics: What should we do?

34
New cards

 What is Predictive Data Analytics?

Predictive Data Analytics uses advanced analytical methods to use data to predict and generate reports. Techniques like predictive modeling are used to profile and segregate customers.

35
New cards

 Explain Prescriptive Data Analytics.

Prescriptive analytics advises organizations on how to react in the best way possible based on predictions. It's the most powerful level of data analytics and is used in various sectors like retail, healthcare, and manufacturing.

36
New cards

Describe Machine Learning.

Machine Learning is a set of scientific algorithms that identify patterns in big data to learn from the data and create insights. It's used for tasks like personalizing marketing campaigns, analyzing genomics, and steering autonomous vehicles.

37
New cards

What are some key applications of Natural Language Processing (NLP)?

NLP applications "SISTER":

  • S for Sentiment Analysis

  • I for Information Extraction

  • S for Summarization

  • T for Translation

  • E for Entity Recognition

  • R for Relationship Extraction

38
New cards

Describe the evolution from Web 1.0 to Web 2.0.

 Web 1.0 consisted of static pages and author-controlled content, while Web 2.0 transitioned to a more dynamic web with user-generated content and collaboration across multiple platforms like social media, blogs, and wikis.

39
New cards

What is the Semantic Web (Web 3.0)?

The Semantic Web, or Web 3.0, is a web of data that uses metadata tags, artificial intelligence, natural language processing, and other semantic tools to make the web a giant, readable database for computers.

40
New cards

 What are some concerns associated with the dark side of social media?

Cyberbullying, privacy issues, security threats, fake news, lower moods, anxiety, depression, disturbed sleep, and social media addiction.

41
New cards

How do recommendation engines work?

Recommendation engines use data analysis techniques like content-based filtering (based on item similarity) and collaborative filtering (based on user similarity) to proactively identify products that consumers might want to buy.

42
New cards

What are the features and benefits of Semantic Search?

Semantic search features include related searches/queries, reference results, semantically annotated results, concept searches, ontology-based searches, and natural language search, all contributing to more contextually relevant search results.

43
New cards

What is Artificial Intelligence (AI)?

AI is the theory and development of computer systems able to perform tasks normally requiring human intelligence such as visual perception, speech recognition, decision making, and translation between languages.

44
New cards

List the six branches of AI.

  • Machine learning: Machines that can learn.

  • Deep learning: Sophisticated learning machines that use neural networks.

  • Natural language processing (NLP): Machines that can communicate like humans.

  • Expert systems: Machines that solve complex problems.

  • Fuzzy logic: Machines that replicate human reasoning abilities.

  • Robotics: Robots that use AI to learn, solve problems, and communicate.

Acronym: "FERN MD"

45
New cards

How is AI used in business?

AI is used in business for sentiment analysis, understanding consumer attitudes and emotions, especially in the era of social media, and it gives companies insights into consumer experiences and influences consumer behavior.

46
New cards

 How does AI impact society?

AI impacts society in law enforcement and public safety, healthcare and medicine, and public sector operations, among other areas, but also raises concerns about job loss, privacy violations, and systemic biases.

47
New cards

What are the ethical considerations in AI?

Ethical considerations include the fear of job loss and financial ruin, privacy and civil rights violations, systematic bias in machine learning algorithms and data, and the societal impact of AI-driven automation.

48
New cards

What is IT Strategic Planning?

IT Strategic Planning is a series of processes where an organization selects and arranges its services to remain healthy or functional, even when unexpected events disrupt parts of its operations. It includes deciding long-term business directions and resource deployment.

49
New cards

Explain Porter's Five Forces.

You can use the acronym "CBBSR":

  • C for Competition in the industry

  • B for Bargaining power of suppliers

  • B for Bargaining power of customers (buyers)

  • S for Substitution risk (threat of substitute products or services)

  • R for Risk of new entrants

50
New cards

What are IT Service Management (ITSM) and ITIL®4?

IT Service Management (ITSM) is a strategy by which IT systems are offered as a service to achieve business-IT alignment and smooth operations. ITIL®4 is a framework for managing the IT service lifecycle, aligning IT resources with business needs to co-create value.

51
New cards

What are Gartner's Top 10 Strategic Technology Trends?

The trends include Artificial Intelligence and Machine Learning, Intelligent Apps, Intelligent Things, Virtual and Augmented Reality, Digital Twin, Blockchain and Distributed Ledgers, Conversational Systems, Mesh App and Service Architecture, Digital Technology Platforms, and Adaptive Security Architecture. Acronym: "ABC-DVS"

52
New cards

What is the System Development Life Cycle (SDLC)?

The SDLC is a multiple-stage approach used by IT professionals to develop high-quality information systems, encompassing stages from planning and analysis through support and maintenance.

53
New cards

What are the stages of the SDLC?

"PADI-S":

  • P for Planning

  • A for Analysis

  • D for Design

  • I for Implementation and Testing

  • S for Support and Maintenance

54
New cards

 Define Waterfall Method in software development.

The Waterfall Method is a sequential and predictive software development process, where each phase must be completed before the next begins, with no overlap or iterative steps.

55
New cards

What is the Agile Methodology?

Agile Methodology is a flexible, iterative approach to software development, delivering components early and often. Variations include Scrum and Extreme Programming.

56
New cards

What is "wardriving" in the context of Google Street View?

Wardriving involves driving around to sniff out and map the physical location of Wi-Fi routers. It raises privacy concerns, especially when done on open, non-password protected Wi-Fi networks.

57
New cards

Define Sustainability in the context of Information and Communication Technology (ICT).

Sustainability in ICT is the ability to create and maintain conditions that allow humans and nature to coexist productively, supporting present and future generations. It focuses on balancing economic, social, and environmental factors, often referred to as profits, people, and planet.

58
New cards

What are the ethical concerns in predicting people's behavior with IT?

Ethical concerns include potential backlash from customers, investigations, fines, and privacy violations. It raises questions about consent, data usage, and the balance between business interests and individual rights.