MIS FInal Lecture

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/141

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

142 Terms

1
New cards
Operating system process
Hardware, operating system, application, user
2
New cards
Computing hardware
Physical components of information technology, which includes the computer and its peripherals
- Storage devices
- Input devices
- Output devices
3
New cards
Applications
Includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations.
4
New cards
Operating System (OS)
The system software that controls the way in which a computer system functions, including the management of hardware, peripherals, and software.
5
New cards
Embedded system
special-purpose software designed and included inside physical products
6
New cards
Firmware
Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.
7
New cards
Desktop application
are installed used on a personal computer computing device typically supporting tasks performed by a single user ex safari
8
New cards
Enterprise application
address the needs of multiple users throughout an organization work group ex SAP, oracle
9
New cards
CRM (Customer Relationship Management)
involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

systems used to support customer-related sales and marketing activity
10
New cards
Supply chain management (SCM)
Systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption.
11
New cards
Business intelligence (BI) system
Systems that use data created by other systems to provide reporting and analysis for organizational decision making.
12
New cards
Database management system (DBSM)
software for creating, maintaining, and manipulating data

Stored and retrieves the data created and used by enterprise applications

Firms with common database systems and standards benefits from increases organizational insight and decision- making capabilities
13
New cards
ERP (Enterprise Resource Planning)
a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform

a system that runs everything
14
New cards
Service-oriented architecture (SOA)
set of web services built around an organization's processes and procedures

ex Web server, app server, database
15
New cards
Programming language
provides standards, syntax, statements, and instructions for writing computer software
16
New cards
Scripting languages
programming languages used to create scripts

ex VB script, JavaScript, Python, R
17
New cards
What is open-source software (OSS)?
Software that is free and where anyone can look at andpotentially modify the code
18
New cards
Network operators (carriers)
Act as a gatekeeper between content (app) providers and subscribers -\> took large cut in proceeds
19
New cards
Cloud computing
a model for enabling on-demand network access to a shared pool of configurable computing resources (eg servers, storage, applications) that can be rapidly provisioned with minimal service provider interactions

ex Laptops, ring doorbell
20
New cards
data center
A facility used to house management information systems and associated components, such as telecommunications and storage systems
21
New cards
virtual machine
The apparent machine that the operating system presents to the user, achieved by hiding the complexities of the hardware behind layers of operating system software.
22
New cards
Iaas (infrastructure)
"i need a server"
23
New cards
Paas (platform)
"I developed or acquired an app, i need a place to run it"
24
New cards
SaaS (software)
"I want access to a software app via thin client interface (web browser, turbo tax, office)"
25
New cards
Software stack
App, data, runtime, middleware, OS, virtualization, seerveers, storage, networking (up to bottom)
26
New cards
Infrastructure IaaS
virtualization, seerveers, storage, networking (the rest is you) (ex of hyper v)
27
New cards
PaaS
runtime, middleware, OS, virtualization, seerveers, storage, networking (windows, apple, android, linux)
28
New cards
SaaS
All App, data, runtime, middleware, OS, virtualization, seerveers, storage, networking (up to bottom) (office 365)
29
New cards
Public cloud
is made available to the general public and owned by an organization selling cloud services
30
New cards
Private cloud
the cloud infrastructure is operated solely for an organization
Ex banks, CIA
31
New cards
Virtualization
A type of software that allows a single computer or cluster of connected computers to function as if it were several different computers

Each computer runs its own operating system and software
32
New cards
SaaS risks
- Depending on single vendor
Concern about king-term viability of partener firms
Reliance on a network connection which may be slower, less stable, and less secure
Limited configuration, customization, and system integration options compared to packaged software or alternatives developed in-house
33
New cards
Phishing/ snooping
cons executed using technology in order to acquire sensitive information or trick someone into installing malicious software
34
New cards
Social engineering
con games that trick employees into revealing information or performing other tasks that comprise a firm

Pretending to be someone you're not to do criminal activity
35
New cards
Zero-day exploits
new attacks that haven't been clearly identified and have not been incorporated into security screening systems
36
New cards
Methods of infecting
Viruses, worms, trojans
37
New cards
Viruse
infect other software or files
38
New cards
Worms
take advantage of security vulnerability to automatically spread
39
New cards
Trojans
attempt to sneak in by masquerading as something they're not
40
New cards
Botnets
used in click fraud and sending spam
41
New cards
Malicious adware
Installed without full user consent or knowledge, later serve unwanted advertisements
42
New cards
Spyware
monitors users actions, network traffic, or can for files
43
New cards
Keylogger
records user keystrokes software based or hardware based
44
New cards
Screen capture
Records pixels that appear on a user's screen to identify proprietary information
45
New cards
Card skimmer
Captures data from a card's magnetic strip
46
New cards
Ransomware
malware that encrypts user's files with demands that a user pay to regain control of their data and/or device
47
New cards
Encryption
scrambling data using a code thereby hiding those from who do not have the unlocking key
48
New cards
Key Code
a unique identifier placed on the response device or order form prior to mailing a promotional piece to track and measure results

unlocks encryption
49
New cards
Brute-force attacks
Exhausts all possible password combinations to break into an account
50
New cards
Database
single tab or a collection of related tabs
51
New cards
DSMB
Software for creating, maintaining, and manipulating data (also known as database software)
52
New cards
Table or file
A list of data, arranged in columns (fields) and rows (records).
53
New cards
Column or field
A column in a database table. Columns represent each category of data contained in a record (e.g., first name, last name, ID number, date of birth).
54
New cards
Row or record
A row in a database table. Records represent a single instance of whatever the table keeps track of (e.g., student, faculty, course title).
55
New cards
key
A \___ is the field or fields used to relate tables in a database
56
New cards
Big data
the collections, storage,and analysis of extremely large data, complex, and often unstructured data set used by organizations to generate insight that would me impossible to make (unstructured data raw not in a relational database)
57
New cards
Business intelligence(BI)
A term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.
58
New cards
Data Mining
The process of using computers to identify hidden patterns in, and to build models from, large datasets
59
New cards
Data warehouse
A set of databases to support decision-making in an organization
60
New cards
Data Mart
:Database or databases focused on addressing the concerns of a specific problem or business unit
61
New cards
Data lake
collection of structured, semi-structured, and unstructured data stored in a single location
62
New cards
ETL (Extract, Transform, Load)
copying data from multiple, disparately organized data sources, transforming (or cleaning) the data into a common format, and loading it into a combined usable format
63
New cards
Query Tools
A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria.
64
New cards
R
A programming language specifically created for analytics, statistical, and graphical computing
65
New cards
Benefits from data mastery
data leverage is at the center of competitive advantage in firms such as amazon, netflix, dell, and zara
66
New cards
Dynamic pricing
changing pricing based on demand conditions
67
New cards
Analytics
helps firm understand how valuable a customer is

Ex Switch to digital ticketing
68
New cards
Data
raw facts and figures
69
New cards
Information
data presented in a context so that it can answer a question or support decision-making
70
New cards
knowledge
insight derived from experience and expertise(based on data and info)
71
New cards
Data mining
The automated search in large databases for non-obvious patterns and relationships to anticipate events or predict outcomes
72
New cards
Four classes of techniques
Classification, clustering. regression, association detection
73
New cards
Classification
Used to retrieve important and relevant information about data and metadata this mining method helps to classify data in different types (decision trees)
74
New cards
Clustering
Mining tech to identify data that are like each other the process helps to understand the differences and similarities between the data
75
New cards
Regression
Mining method of id and analyzing the relationship between variables is used to id the likelihood of a specific variable given presence of other variables
76
New cards
Association detection (market basket analysis)
mining tec helps to find the association between two or more items discovers a hidden pattern in data set
77
New cards
Classification 2
arrange data into predefined groups

Ex class apps by low, med, high risk
Customers as"loyal" vs. "likely to terminate contract"
78
New cards
Differences between classifications and clustering
Classification depends on predefined categories

Clustering does not rely on being predefined categories grouped together based on self-similarity
79
New cards
Cluster analysis
similar records (or characteristics) are grouped together

Ex market segmentation: identify customers with similar buying behavior
80
New cards
Association detection
(one event is correlated to another event)
Determine which behaviors/outcomes go together

ex market basket analysis
81
New cards
market basket analysis
determine what things go together in a shopping cart at the supermarket
82
New cards
Antecedent
a thing or event that existed before or logically precedes another
83
New cards
consequent
the outcome of the hypothetical condition in the major premise of a conditional syllogism
84
New cards
Confidence
at what rate consequences will be found given that antecedent has occurred P(Beer | Milk & Diaper)
85
New cards
Sermo
is a social network for physicians
86
New cards
Sock puppet
Fake online persona created to promote a particular point of view, product, or individual
87
New cards
Astroturfing
Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.
88
New cards
\_______ has become a vehicle for foreign governments and purveyors of "fake news"
Twitter
89
New cards
Peer production
Collaboration between users to create content, products, and services
90
New cards
Collaborative consumption
Participants share access to products and services, rather than having ownership
91
New cards
BOM
bill of materials
92
New cards
MRP
material requirement planning
93
New cards
Content adjacency
Concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands.
94
New cards
content adjacency problem
A situation where ads appear alongside text the advertiser would like to avoid.
95
New cards
prediction market
Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.
96
New cards
Short selling
selling stock borrowed from a broker that must be replaced at a later time

an attempt to profit from a falling stock price
97
New cards
Viral distribution
Facebook allows any developer to add a Facebook "Like" button to their site with just a few lines of HTML code. What advantage do websites leverage by integrating this feature?
98
New cards
software
the set of instructions that tells hardware what to do
99
New cards
Firmware 2
a device's control programs stored on nonvolatile memory chips.
100
New cards
platforms
Products and services that allow for the development and integration of software products and other complementary goods