MIS Exam #3 Other Questions: (CHAPTER 6-10)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:59 AM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

64 Terms

1
New cards

What is Master Data? (Chapter 6)

Core data shared across systems and departments

2
New cards

What is Operational System? (Chapter 6)

System used for daily business operations

3
New cards

What is Informational System? (Chapter 6)

System used for analysis and decision making

4
New cards

What is Data Mart? (Chapter 6)

Smaller subset of a data warehouse

5
New cards

What is Dataset? (Chapter 6)

Organized collection of related data

6
New cards

What is Labeled Dataset? (Chapter 6)

Data with tags for supervised learning

7
New cards

What is Unlabeled Dataset? (Chapter 6)

Data without tags for unsupervised learning

8
New cards

What is Association Discovery? (Chapter 6)

Finds relationships between items

9
New cards

What is Prediction? (Chapter 6)

Forecasting future outcomes using data

10
New cards

What is Text Mining? (Chapter 6)

Extracting information from text data

11
New cards

What is Web Usage Mining? (Chapter 6)

Analyzing user behavior on websites

12
New cards

What is Generative AI? (Chapter 6)

AI that creates new content

13
New cards

What is LLM (Large Language Model)? (Chapter 6)

AI trained on large text datasets

14
New cards

What is GPT (Generative Pre-trained Transformer)? (Chapter 6)

Model that generates human-like text

15
New cards

What is Intelligent Agent? (Chapter 6)

System that performs tasks automatically

16
New cards

What is Core Business Process? (Chapter 7)

Essential process generating value and revenue

17
New cards

What is Supporting Business Process? (Chapter 7)

Processes supporting core operations

18
New cards

What is Data Flow? (Chapter 7)

Movement of data between processes

19
New cards

What is Enterprise-Wide System? (Chapter 7)

System integrating all business functions

20
New cards

What is Internally Focused System? (Chapter 7)

System supporting internal operations

21
New cards

What is Externally Focused System? (Chapter 7)

System connecting with external partners

22
New cards

What is Packaged Software? (Chapter 7)

Prebuilt software sold to many organizations

23
New cards

What is Custom Software? (Chapter 7)

Software built for specific needs

24
New cards

What is Module? (Chapter 7)

System component implemented as needed

25
New cards

What is Vanilla System? (Chapter 7)

Standard system without customization

26
New cards

What is Best Practices Software? (Chapter 7)

System based on industry-standard processes

27
New cards

What is Supplier Portal? (Chapter 8)

Platform connecting one buyer to many suppliers

28
New cards

What is Customer Portal? (Chapter 8)

Platform connecting one supplier to many customers

29
New cards

What is Product Flow? (Chapter 8)

Movement of goods through supply chain

30
New cards

What is Information Flow? (Chapter 8)

Movement of data through supply chain

31
New cards

What is Financial Flow? (Chapter 8)

Movement of money through supply chain

32
New cards

What is Demand Forecasting? (Chapter 8)

Predicting future customer demand

33
New cards

What is Supply Chain Analytics? (Chapter 8)

Analyzing supply chain performance

34
New cards

What is Social CRM? (Chapter 8)

Using social media to manage relationships

35
New cards

What is Sales Force Automation? (Chapter 8)

Tools supporting sales processes

36
New cards

What is Customer Service CRM? (Chapter 8)

Systems handling customer support

37
New cards
38
New cards

What is Attack Payload? (Chapter 10)

Malicious code delivered during an attack

39
New cards

What is Attack Surface? (Chapter 10)

All possible points of system entry

40
New cards

What is OWASP? (Chapter 10)

Top web application security risks list

41
New cards

What is Mitigation? (Chapter 10)

Strategies to reduce security risks

42
New cards

What is Preventive Control? (Chapter 10)

Stops attacks before they happen

43
New cards

What is Detective Control? (Chapter 10)

Detects attacks

44
New cards

What is Corrective Control? (Chapter 10)

Fixes damage after attacks

45
New cards

What is Least Privilege? (Chapter 10)

Minimum access given to users

46
New cards

What is Identification? (Chapter 10)

Claiming identity

47
New cards

What is CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)? (Chapter 10)

Test distinguishing humans from bots

48
New cards

What is Plaintext? (Chapter 10)

Readable data

49
New cards

What is Ciphertext? (Chapter 10)

Encrypted unreadable data

50
New cards

What is IS Audit? (Chapter 10)

Evaluation of system security

51
New cards

What is SOX (Sarbanes-Oxley Act)? (Chapter 10)

Law requiring financial accountability

52
New cards

What is 3rd Platform of Computing? (Digital Transformation)

SMAC-based computing environment

53
New cards

What is 4th Platform? (Digital Transformation)

AI-driven computing platform

54
New cards

What is Digital Principles? (Digital Transformation)

Guidelines for digital transformation

55
New cards

What is Digital Generativity? (Digital Transformation)

Ability to create new innovations

56
New cards

What is Digital Heterogeneity? (Digital Transformation)

Diversity in devices and platforms

57
New cards

What is Digital Connectivity? (Digital Transformation)

Connection between systems and users

58
New cards

What is Enterprise Data Architecture? (Digital Transformation)

Structure of enterprise data systems

59
New cards

What is NoSQL Database? (Digital Transformation)

Database for unstructured data

60
New cards

What is Network Effect? (Digital Transformation)

Value increases with more users

61
New cards

What is SDI (Software-Defined Infrastructure)? (Digital Transformation)

Infrastructure controlled by software

62
New cards

What is SDN (Software-Defined Network)? (Digital Transformation)

Network managed by software

63
New cards

What is SDS (Software-Defined Storage)? (Digital Transformation)

Storage managed by software

64
New cards

Database Instructor Covered

  • Insecure Direct Object Reference

  • SQL Injection (Attack Vector)