cis tes 3 (chapter 3,8,10,11,12) Flashcards

(63 cards)

1
Q

what do business intelligence systems do

A

help organizations make informed decisions using data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 primary business intelligence activities

A

acquiring data, analyzing data, presenting results (aap)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data warehouse

A

collect and clean large amounts of data from many sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data marts

A

smaller, focused collections of data for specific departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

possible problems with source data

A

dirty data, missing values, inconsistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 techniques for processing BI data

A

reporting (summarizes data into readable formats- RFM= recently, frequently and how much money), data mining (finds patterns- supervised= no prior assumptions and nonsupervised), big data (analyzes large complex data sets w high volume)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why is AI important

A

machine to simulate human activities, changes how decisions made and tasks automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

forces driving AI advancement

A

increased computing power, increased device connectivity, new techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

weak AI vs strong AI

A

specific tasks vs can do anything a human can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

by 2031 BI systems

A

understand routines, singularity= point where machines improve without human help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is cybersecurity

A

protecting networks, devices and data from unauthorized access or attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 pillars of information security

A

confidentiality, integrity, availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats confidentiality

A

how secure is data- use authentication (passwords, biometrics) and authorization (who can access what)- failure happens when unauthorized someone can obtain and view data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

whats integrity

A

keep data accurate and unaltered (use tools like hashing- data into nondescript text; access control and secure storage) failure happens when someone modifies data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

whats availability

A

ensure users can access data when needed - failure happens if data cant be accessed by end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how organizations should respond to threats

A

hardware/software= encryption and firewalls; data= passwords; procedures and people = training, education, procedure design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how individuals respond to security threats

A

antivirus software, strong passwords, watch for phising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how to close pop up tab with malicious hyperlink

A

command q in mac or alt+fn+f4 in windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

signs of phising

A

sense of urgency, loss if not acted on, attachments, hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how to see if link fradulent

A

find first forward slash and count first 2 periods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

business process

A

set of activities that transform inputs into outputs to add value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

structured process

A

standard, day to day operations such as placing orders (formal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

dynamic process

A

flexible, adaptive processes such as strategic planning (more informal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

3 levels of process

A

workgroup (within one department), enterprise (span multiple departments one company), inter-enterprise (span across 2+ seperate organizations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
common workgroup processes
sales and marketing, operations, manufacturing, customer service, human resources, accounting
26
process efficiency
doing things right (ex using fewer resources)
27
process effectiveness
doing the right things (ex meeting strategic goals)
28
how information systems improve process quality
automate activities (ex online reservation system) , assist decision making and control data quality (ensure correct customer info)
29
information silos
isolation of data in separated info systems--> problems = data integrity (when data inconsistent), solution= combine data into one database
30
business process reengineering (BPR)
= activity of altering business processes to take advantage of new IT systems
31
enterprise systems that help manage processes- CRM (customer relationship management)
manages customer interactions
32
enterprise systems that help manage processes- ERP (enterprise resource planning)
integrates all core business processes
33
enterprise systems that help manage processes- EAI (enterprise application integration)
connects existing systems without replacing them, provides integrated information
34
elements of ERP system
hardware, software applications, databases, business procedures, training and consulting (h, sa, d, bp, t, c)
35
ERP applications
integrate supply chain, manufacturing, CRM, human resources, accounting
36
challenges of implementing and upgrading enterprise info systems
collab management (no single authority over system decisions), requirement gaps (software may not fit all organizational needs), transition issues (difficult and require training), employee resistance (fear or lack of confidence in using new systems)
37
outsourcing
hiring external organizations to perform IS services. Cost savings, access to expertise and reduction in management load.
38
international outsourcing
common in india and china because of low labor costs, skilled english speaking workforce
39
outsourcing alternatives and risks
IAAS cloud hosting/ PAAS etc- risks of outsourcing= loss of control, dependency on vendor, hidden costs, security concerns
40
business process and information system
business process not required to use an IS but every IS supports at least one business process
41
BPM (business process management)
manage and improve business processes which are networks of activities and databases and flows
42
properties of processes
roles (collection of activities), resources (pple or software), flow (control flow- order of activities; and data flow- movement of data among activities)
43
repository
collection of something- inventory= physical repository
44
5 phases of SDLC (systems development life cycle)
system definition, requirements analysis, component design, implementation, system maintenance (padim)
45
System definition (SDLC)
define goals, assess feasibility (cost, schedule, technical, organizational), plan project
46
requirements analysis (SDLC)
determine user needs, identify new application features
47
component design (SDLC)
design hardware, software, data and procedures
48
implementation (SDLC)
build and test system; convert to new system
49
system conversion approaches
pilot (implement entire system in limited portion of business); phased (system installed in phases- each piece tested); parallel (complete new and old systems run together- very safe but expensive); plunge (high risk if new system fails, used if new system not vital)
50
system maintenance (SDLC)
fix or enhance the system after development
51
how can scrum overcome problems of SDLC
scrum is agile development method that handles change better than SDLC
52
Scrum roles
product owner (represents the customer); scrum master, team members (5-9)
53
key scrum principles
embrace changes in requirements, deliver working versions, testing and improvement, work in short cycles, daily standup meetings
54
padim, is must have many bs, is cia, ba goal,
yes acronyms
55
ETL
extract, transport, load
56
3 primary activities in BI
APP- acquire, perform, publish
57
big data
velocity, variety, volume
58
5 components of BI system
pple, procedures, hardware, software, data
59
4 implementation
pilot (one department), plunge (do when operation isnt vital), parallel (new and old same time), phased (each piece tested)
60
BPR
changing the structure
61
3 enterprise IS
ERP (core business function) , EAI (connects) , CRM (customers)
62
customer life cycle stages
ASSRC (ass rack)
63
adv/disadv of outsourcing
no manage, risk reduction but no easy exit and loss of control