560 Flashcards

(176 cards)

1
Q

Big Data

A

datasets whose size and speed are beyond the ability of typical database software tools to capture, store, manage, and analyze.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Analytics

A

the use of software and statistics to find meaningful insight in the data, or better understand the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Visualization

A

Tools that make it easier to understand data at a glance by displaying data in summarized formats.
Dashboards and maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supply Chain

A

All businesses involved in the production and distribution of a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dashboards

A

data visualizations that display the current status of key performance indicators in easy to understand formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet of Things

A

a set of capabilities enabled when physical things are connected to the internet via sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Machine to Machine technology

A

enables sensor embedded products to share reliable real time data via radio signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unstructured Data

A

Do not have a predictable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Science

A

involves managing and analyzing massive sets of data for purposes such as marketing, trends, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Processes

A

Series of steps by which organizations coordinate and organize tasks to get work done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Formal Processes

A

documented and have well-established steps. Taking a CC pmt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standard Operating Procedures

A

Who performs, What materials, where

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Process Re-engineering

A

Methods and efforts to eliminate wasted steps within a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agility

A

being able to respond quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Responsiveness

A

that IT capacity can be easily scaled up or down as needed, which requires cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flexibility

A

having the ability to quickly integrate new business functions or easily reconfigure software or apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules of SWOT

A

Be realistic about strengths and weaknesses
Also about size of Ops + Threats
Specific and keep analysis simple
Evaluate strengths + weaknesses
Expect conflicting views, SWOT is subjective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Five Industry Forces

A

Threat of entry new competitors
Bargaining power of suppliers
Bargaining power of customers or buyers
Threat of substituting products or services
Competitive rivalry among existing firms in the industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 Primary Activities

A

Inbound logistics- acquiring and receiving of raw materials and other inputs
Operations - manufacturing and testing
Outbound Logistics - packaging, storage, delivery, distribution
Marketing and Sales - customers
Services - customer services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Support Activities

A
Primary Activities rely on them. 
Infrastructure, accounting, finance
HR 
R&D
Procurement or purchasing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Governance

A

is the control of enterprise data through formal policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enterprise Architecture

A

guides the evolution and expansion of information systems, digital technology, and business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Customer Centeric

A

best suited for the cutomer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Touchpoint

A

any influencing action initiated through communication, human contact or physical or sensory interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Dirty Data
data of such poor quality that they cannot be trusted or relied upon for decisions
26
Master Data Management
methods synchronize all business critical data from disparate systems into a master file, which provides a trusted data source
27
Information management
use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent.
28
Data Silo
data stores in which their data are not accessible by other ISs that need it or outside of that department
29
Data Silos Exist When:
there is no overall IT architecture to guide IS investments, data coordination, and communication
30
Advantages of information management are:
Improves decision quality Improves the accuracy and reliability of management predictions Reduces the risk of non compliance Reduces the time and cost
31
Problems that Enterprise Architecture is designed to Address
IT systems Complexity | Poor business alignment
32
Benefits of having the right Enterprise Architecture in place
Cuts IT cost + increases productivity Determines an organizations competitiveness align capabilities with strategy
33
Components of Enterprise Architecture
Business Architecture - The process the business uses to meet its goals Application architecture - how specific applications are designed and how they interact with each other Data Architecture - How an enterprise's data stores are organized and accessed Technical architecture - the hardware and software infrastructure that supports applications and their instructions.
34
Database
is a repository or data store that is organized for efficient access, search, retrieval, and update
35
Information
data that have been processed, organized or put into context so it has meaning
36
Knowledge
Consists of data and/or information that has been processed, organized, and put in context to be meaningful, and to convey undedstanding
37
Transaction Processing Systems
designed to process specific types of data input from ongoing transactions
38
Types of Transactions
Internal - originate within the organization. payroll, purchases External - originate from outside the organization. customers, suppliers, etc
39
Batch Processing
TPS in batch mode collects all transactions for a day, shift, or other rime period, then processes the data and updates the data stores
40
Online Transaction Processing
TPS processes each transaction as it occurs, which is what is meant by the term real time processing. Webiste must be linked via a network to the TPS
41
Management Information Systems
Their objective is to provide reports to managers for tracking operations, monitoring, and control
42
Decision support systems (DSS)
INTERACTIVE APPLICATIONS THAT SUPPORT DECISION MAKING.
43
Unstructured Decision
depend on human intelligence, knowledge, and/or experiences
44
What if Analysis
refers to changing assumptions or data in the model to observe the impacts of those changes on the outcome.
45
Data Center
a large number of network servers used for the storage, processing, management, distribution and archiving of data, systems, web traffic, services and enterprise applications
46
Service Level Agreements
A negotiated agreement between a company and service provider that can be a legally binding contract or an informal contract.
47
Software as a service(SaaS)
any software that is provided on demand Google Apps Salesforce.com
48
How is Virtualization used to create Virtual Machines
Application Layer Virtualization Layer Hardware Layer
49
What is Virtualization
is a Technique that creates a virtual layer and multiple virtual machines to run on a single physical machine.
50
PaaS -
set of tools and services that make coding and deploying these apps faster and more efficeint
51
Iaas- Information as a service
consists of hardware and software that power computing resources servers, storage, os, and networks
52
Data as a Service (DaaS)
enables data to be shared among clouds, systems, apps, and so on regardless of the data source or where they are stored.
53
Centralized Databases
Store data at a single location that is accessible from anywhere.
54
Volatile Data
can change frequently
55
Data Warehouse
integrate data from multiple databases and data silos, and organize them for complex analysis, knowledge discovery, and to support decision making.
56
Data Marts
small-scale data warehouses that support a single function or one department
57
Business Intelligence
tools and techniques process data and do statistical analysis for insight and discovery. discover meaningful relationships
58
Database management systems (DBMSs)
integrate with data collection systems such as TPS and business applications: store the data in an organized way and provide facilities for accessing and managing that data
59
Relational database
store data in tables consisting of columns and rows, similar to a spreadsheet
60
Relational Management Systems (RDBMSs)
provide access to data using a decarative language
61
Extract, Transform, Load (ETL)
Extracted by designated databases Transformed by standardizing formats, cleaning the data, and integrating them Loaded into a datawarehouse
62
Active Data Warehouse (ADW)
real time data warehousing and analytics
63
Business Analytics
describes the entire function of applying technologies, algorithms, human expertise, and judgement
64
Data Mining
software enables users to analyze data from various dimensions or angles, categorize them, and find correlations or patterns among fields in the data warehouse
65
Text Mining
a broad category that involves interpreting words and concepts in context
66
Internet Protocol IP -
Basic technology that makes global communication possible
67
IP address
Each device attached to a network has an IP address that enables it to send and receive files.
68
Packets
Files are broken down into blocks known as packets in order to be transmitted over a network to their destination, which also has a unique IP address.
69
Bandwidth
The capacity or throughput per second of a network
70
Traffic Shaping
The ability to prioritize and throttle network traffic
71
Protocol
rules and standard that govern how devices on a network exchange data and talk to each other.
72
Mashup
A general term referring to the integration of two or more technologies
73
Application program Interface (API)
an interface is the boundary where two separate systems meet. API provides a standard way for different things such as software, content, or websites, to talk to each other in a way they both understand.
74
Bluetooth
a short-range wireless communications technology
75
Wi-Fi
the standard way computers connect to wireless networks
76
Intranets
used for data access, sharing, and collaboration. they are portals or gateways that provide easy and inexpensive browsing and search capabilities.
77
Extranet
a private, company-owned network that can be logged into remotely via the internet
78
Virtual private networks (VPNs)
encrypts the packets before they are transferred over the network
79
Malware
short for malicious software, computer programs whose code causes disruption, destruction, or other devious action.
80
BlackPOS
is malware designed to be installed on POS devices in order to record data from credit and debit cards swiped through the infected device.
81
Distributed Denial of Service (DDoS)
attack bombards a network or website with traffic to crash
82
Critical Infastructure
systems and assets, so vital to the US that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or saftey
83
Advanced Persistent Threat (APT)
hackers remaining unnoticed so they can continue to steal data
84
Internal Threats
major challenge largely due to the many ways an employee can carry out malicious activity
85
Phishing
a deceptive method of stealing confidential information by pretending to be a legitimate organization
86
Enterprise Risk Management
a risk based approach to managing an enterprise that integrates internal control, the SOX mandates and strategic planning
87
Control Objectives for Information and Related Technology (CORBIT)
is an internationally accepted IT governance and control framework for aligning IT with business objectives, delivering value, and managing associated risks.
88
Payment Card Industry Data Security Standard (PCI DSS)
requires merchants and card payment providers to make certain their Web applications are secure
89
IT Security Model
1. Senior management commitment and support 2. Acceptable use policies and IT security training 3. IT security procedures and enforcement 4. Hardware and Software
90
Remote-Access Trojans (RATS)
create an unprotected backdoor into a system through which a hacker can remotely control that system
91
Payload
refers to the actions that occur after a system has been infected.
92
Search Engine Results Page (SERP)
the list of links and other descriptive information about webpages returned by a search engine in response to a search quesry
93
Keywords
words or phrases that describe the content on a webpage
94
Search Engine Optimization (SEO)
a collection of strategies and techniques designed to increases the number of visitors to a website as a result of the websites rank on the search engine results page.
95
Search Engine
an application for locating webpages or other content on a computer network.
96
Crawler Search Engine
rely on sophisticated computer programs called spiders, crawlers, or bots that surf the internet locating webpages links and other content that are then stored in the search engines page repository.
97
Web Directories
are categorized listings of webpages created and maintained by humans.
98
Hybrid Search Engines
combine the results of a directory created by humans and results from a crawler search engine with the goal of providing both accuracy and broad coverage of the internet.
99
Meta Search engines
combine results from other search
100
Semantic Search Engines
designed to located information based on the nature and meaning of Web content not simple keywords matches.
101
Page Repository
a data structure that stores and manages information from a large number of webpages, providing a fast and efficient means for accessing and analyzing the information at a later time
102
Crawler control module
software program that controls a number of spiders responsible for scanning or crawling through information on the Web.
103
Petabyte
a unit of measurement for digital data storage = to one million gigabytes
104
Enterprise Search
tools are used by employees to search for and retrieve information related to their work in a manner that complies with the organization's information sharing and access control policies.
105
Structured Data
information with a high degree of organization
106
Unstructured Data
information that is not organized
107
Search Engine Marketing (SEM)
a collection of online marketing strategies and tactics that promote brands by increasing their visibility in SERPs through optimization and advertising
108
Recommendation Engines
anticipate information that a user might be interested in
109
Pay per click (PPC)
advertisers pay search engines based on how many people click on the ads
110
Click through rates (CTRs)
the percentage of people who click on a hyperlinked area of a SERP or webpage
111
Keyword Conversion rates
likelihood that using a particular keyword to optimize a page will result in conversions
112
Semantic Web
semantics is meaningful computing the application of natural language processing to support information retrieval, analytics and data integration that compass both numerical and unstructured information
113
Spiders
also known as crawlers web bots or simply bots, are small computer programs designed to perform automated, repetitive tasks over the internet
114
Dwell Time
Users who stay on a site longer are probably more satisfied
115
Cost of Customer Acquisition
represents the amount of money spent to attract a paying customer
116
Spear Fishing
A scam where you receive an email that appears to be from someone you work with, but it is fake
117
Distributed Denial of Service (DDOS)
bombards network with traffic
118
Attack Vectors
entry points for malware/hackers
119
Botnet
A collection of bots (malware infected computers) Called zombies can be used to launch DDos Can steal personal or financial data
120
Business Continuity Plan
Maintaining business function or restoring them quickly when there is a major disruption
121
BYOD - Bring your own Device
companies have employees use their own devices for work
122
Advanced Persistent Threat (APT)
attacker wants to remain unnoticed profit motivated criminal Hacker with a personal agenda are not stealthy
123
Firewall
Software/hardware device that controls access to a private network from a public netowork by analyzing data packets
124
Bio metrics
method to identify a person, such as a fingerprint
125
IT governance
supervision, monitoring, and control of an organizations IT assets
126
Intrusion Prevention Systems (IPS)
defense system designed to take immediate actions
127
Service Pack
Patches to update and fix vulnerabilities in an O/S
128
Patches
Fix a vulnerability
129
Data Tampering
Common means of attack, where someone enters false or fraudulent data, or deletes existing data.
130
API
Application programming interface (API). APIs facilitate the transfer of data from one website app to another. APIs can be either proprietary or open source. Use of a proprietary API requires the developer to pay a fee to gain access to data.
131
Crowdfunding
The practice of funding a project or venture by raising monetary contributions from a large number of people.
132
Crowdsourcing
a model of problem solving and idea generation that marshals the collective talents of a large group of people.
133
Mashup
A Web application that combines information from two or more sources and presents this information in a way that creates some new benefit or service.
134
Enterprise mashups
Combine data from internal business sources (e.g., sales records, customer information, etc.) and/or information from external sources for enhanced usefulness and productivity.
135
Open Source
An application programming interface (API) that anyone can use, usually for free.
136
Semantic web
An extension of the World Wide Web that utilizes a variety of conventions and technologies and languages developed by the W3C that allow machines to understand the meaning of web content.
137
Social media
A collection of web applications, based on Web 2.0 technology and culture, that allows people to connect and collaborate with others by creating and sharing digital content.
138
Social web
The new technologies, often called Web 2.0, that dramatically increase the ability of people to interact with businesses and each other, sharing and finding information, and forming relationships.
139
Terms of service (TOS) agreement
A formal listing of the policies, liability limits, fees, and user rights and responsibilities associated with using a particular service. Users are typically required to acknowledge they have read, understand and agree to the terms of the TOS before they are allowed to use the service.
140
Web 2.0
A term used to describe a phase of World Wide Web evolution characterized by dynamic webpages, social media, mashup applications, broadband connectivity, and user-generated content.
141
Groundswell
The spontaneous effort of people using online tools to obtain information, support, ideas, products, and bargaining power from each other.
142
Augmented reality
A technology that superimposes a computer-generated image | onto an image of the real world to provide information or entertainment.
143
Business-to-business (B2B)
Markets in which the buyers, sellers, and transactions involve only organizations, not individual consumers.
144
Digital dependents
The emerging generation of young people who are growing up in a world of broadband connections, constant connectivity, and related technology and who become uncomfortable if they do not have access to it.
145
Digital immigrants
Typically, a member of an older age cohort that may be increasingly comfortable with technology but much less likely to incorporate mobile technology into their shopping behavior.
146
Digital natives
The first generation to have grown up surrounded by digital devices (i.e., computers, smartphones, digital cameras, and video recorders, etc.) and Internet connectivity.
147
Corporate procurement
Also called corporate purchasing, deals with the transactional elements of buying products and services by an organization for its operational and functional needs.
148
E-procurement
It refers to the reengineered procurement process using e-business technologies and strategies.
149
Mobile commerce or m-commerce
The buying or selling of goods and services using a wireless, handheld device such as a cell phone or tablet (slate) computer.
150
Micropayments
Transactions involving relatively small sums of money.
151
Mobile location-based marketing
A marketing strategy that uses information from a mobile device’s GPS or customer’s mobile check-in on a social network to determine the content of marketing communications they receive on the device (e.g., advertisements, coupons, special offers).
152
Omni-channel retailing
The effort by retailers to fully integrate both traditional and emerging methods to influence consumers.
153
Showrooming
Using mobile search engine for locating product reviews and price comparisons while shopping in brick-and-mortar stores.
154
Applications portfolio
A list of major, approved information system projects that are also consistent with the long-range plan. Expectations for sourcing of resources in the project or applications portfolio should be driven by the business strategy.
155
Cloud services—also referred to as edge services
have to integrate back to core internal systems. That is, edge services have to connect and share data with enterprise systems such as order and inventory management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile and social platforms.
156
IT strategy
Shapes the direction of IT investments over the next one to five years to maximize business value and shareholder wealth.
157
Lagging indicators
Confirm what has already happened. They evaluate outcomes and achievements.
158
Offshoring
Sourcing that is done off-shore.
159
Onshore sourcing
Work or development that can be sourced to consulting companies or vendors that are within the same country.
160
Opportunistic repricing
When a client enters into a long-term contract with a vendor, the vendor changes financial terms at some point or overcharges for unanticipated enhancements and contract extensions.
161
Poaching
The vendor develops a strategic application for a client and then uses it for other clients.
162
Shirking
The vendor deliberately underperforms while claiming full payment, for example, billing for more hours than were worked and/or providing excellent staff at first and later replacing them with less qualified ones.
163
The steering committee
A team of managers and staff representing various business units that establish IT priorities and ensure the IT department is meeting the needs of the enterprise.
164
Value driver
Any activity that enhances the value of a product or service to consumers, thereby creating value for the company. Advanced IT, reliability, and brand reputation are examples.
165
Baseline
A specification of the project plan that has been formally reviewed and agreed upon. It should be changed only through a formal change control process.
166
Critical path
The longest path of tasks through a project, as shown on a Gantt chart. A delay of any task on the critical path will delay the project.
167
Deliverables
The outputs or tangible things that are produced by a business process. Common deliverables are products, services, actions, plans, or decisions, such as approval or denial of a credit application. Deliverables are milestones, produced in order to achieve specific objectives.
168
Gantt chart
Horizontal bar chart that graphically displays the project schedule.
169
Milestone
Used to manage the project work effort, monitor results, and report meaningful status to project stakeholders.
170
Project management
Structured methodology to plan, manage, and control the completion of a project throughout its lifecycle.
171
Responsibility matrix
A document that lets everyone know who is responsible for completion of tasks.
172
Scope creep
Refers to the growth of the project, which might seem inconsequential—at least to the person who is requesting that change. Scope creep is the piling up of small changes that by themselves are manageable, but in aggregate are significant.
173
Statement of work (SOW)
Defines the project plan, but does not offer any options or alternatives in the scope.
174
The system development life cycle (SDLC)
The traditional system development method for large IT projects, such as IT infrastructure or an enterprise system.
175
Triple constraint
Three attributes–time, scope, and cost–that must be managed effectively for successful completion and closure of any project.
176
Work breakdown structure (WBS)
List of tasks in a project shown in sequential order, resources allocated to each task, and schedule.