Final Flashcards

(69 cards)

1
Q

Entities

A

Something you collect data about.

EX- people or class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attributes

A

An individual field containing data describing an entity in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Relationship

A

An association between entities in a database to enable data retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Form

A

a business document that contains some predefined data and may include some areas where additional data are to be filled in, typically for adding or modifying data related to a single record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Query

A

method used to retrieve data from a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Structured Query Language (SQL)-

A

most common language used to interface with databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Online Transaction Processing (OLTP)-

A

immediate automated responses to the request from multiple concurrent transactions of customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Dictionary

A

A document prepared by database designers to describe the characteristics of all items in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Warehouse

A

A repository containing data from multiple large databases and other sources that is suitable for direct querying, analysis , or processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Mart

A

A data warehouse that is limited in scope and customized for the decision support applications of a particular end-user group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Intelligence

A

tools and techniques for analyzing data of past and current transactions to obtain an understanding of an organization’s performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Online Analytical Processing (OLAP)-

A

the process of quickly conducting complex analyses of data stored in a database, typically using graphical software tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Order-to-Cash-

A

the set of processes associated with selling a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Procure-to-Pay

A

the set of processes associated with procuring goods from external vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Make-to-Stock

A

the set of processes associated with producing orders based on demand forecasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Make-to-Order-

A

the set of processes associated with producing goods based on customers orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ERP

A

Enterprise resource planning. Acts to support core business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What Is a Supply Chain?

A

A collection of companies and processes involved in moving a product from the suppliers of raw materials to the suppliers of intermediate components, then to final production, and, ultimately, to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What Is a Supply Network?

A

businesses have multiple suppliers, who have multiple suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Supply Chain Strategy

A

Trade off between Supply Chain Efficiency and Supply Chain Effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Supply Chain Planning

A

involves multiple Supply Chain Management tools and modules working together to meet business needs and customer demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Supply Chain Execution

A

focuses on the efficient and effective flow of materials, information, and financial transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Supply Chain Efficiency vs 
Effectiveness

A

–Supply Chain Efficiency

    - Minimizes cost, but increases risk of stock-outs
    - May sacrifice customer service

–Supply Chain Effectiveness

    -Maximizes likelihood of meeting objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Just-in-Time Production

A

Inventory delivered just as it is needed

–Minimizes stock and handling costs
–Reduces obsolescence charges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bullwhip Effect
–Ripple effects due to forecast errors –Coordinated supply chain helps mitigate this
26
XML
Extensive markup language. Important enabling technology for Information Flow
27
CRM
Customer Relationship Management -helps to improve the activities involved in promoting and selling products to customers as well as providing customer service and nourishing long-term relationships.
28
Making a Business Case
The business case sells an investment –Build a strong, integrated set of arguments - Show how an IS adds value to the organization - Lays out the costs and benefits - Used to make a “go” or “no-go” decision - May be used to justify continued funding
29
Faith
Arguments based on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on
30
Fear
Arguments based on the notion that if the system is not implemented, the firm will lose to the competition or go out of business
31
Fact
Arguments based on data, quantitative analysis, or indisputable factors
32
Intangibles and Tangibles
– Tangible costs—total cost of ownership (TCO) - Non-recurring costs (acquisition) - Recurring costs (use and maintenance) – Intangible costs (e.g., loss of customers) –Tangible benefits (e.g., estimated sales gains) –Intangible benefits (e.g., improved customer service)
33
Weighted Multi-criteria matrix
Compares competing investments
34
Productivity Paradox
Measurement, Time Lags, Redistribution, Mismanagement
35
SDLC-
Systems Development Life Cycle Phase 1: Systems Planning and Selection Phase 2: Systems Analysis Phase 3: Systems Design Phase 4: Systems Implementation and Operation
36
Developmental Testing
Testing the correctness of individual modules and the integration of multiple modules
37
Alpha Testing
Testing of overall system to see whether it meets design requirements
38
Beta Testing
Testing of the capabilities of the system in the user environment with actual data
39
Parallel Implementation
old and new systems are used at the same time
40
Direct Implementation
Old system is discontinued on one day, new used on the next
41
Phased Implementation
Parts of the new system are implemented over time.
42
Pilot Implementation
Entire system is used in one location.
43
Types of Maintenance
Implementing Changes Obtaining Maintenance Requests Transforming Requests into Changes Designing Changes
44
RAD
Collect Requirements, Refine Prototype, Review Prototype w/ user, does user accept prototype?
45
Prototyping
Trial and Error
46
Hacking
gaining unauthorized access to computers
47
Cracking
breaking into computer systems with the intent to commit crime or do damage
48
Black Hat Hackers / Crackers
malicious hackers motivated to do harm.
49
White Hat Hackers
hackers who do not intend to do harm
50
Hacktivists
Crackers who are motivated by political or ideological goals and who use cracking to promote their interests
51
Unauthorized Access
–Stealing information –Stealing use of computer resources –Accessing systems with the intent to commit information modification
52
Unauthorized Data Modification
- Can come in a number of ways: - disgruntled employees, contractors - Edward Snowden
53
Worm
A destructive computer code that is designed to copy and send itself throughout networked computers.
54
Trojan Horses
A program that appears to be a legitimate benign program, but carries a destructive payload. Typically do not replicate themselves.
55
Denial of Service (DOS)
An attack by crackers often using zombie computers that makes network resources unavailable to users or available with only a poor degree of service
56
Spyware
software that covertly gathers information about a user through an Internet connection without the users knowledge.
57
Spam
Electronic Junk Mail
58
Cookies
a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
59
Cybersquatting
the dubious practice of registering a domain name then trying to sell the name
60
Cyberwar
INVOLVES COUNTRIES
61
Cyberterrorism
DOES NOT INVOLVE COUNTRIES
62
Firewall
Filters traffic. Filter based on combinations of parameters
63
Cold Backup Site
an empty warehouse with all necessary connections for power and communication but nothing else
64
Hot Backup Site
fully equipped backup facility all needed equipment and one-to-one replication of current data
65
1 to 1
Primary record will have only 1 related record
66
1 to Many
Primary record may have many related records
67
Many to Many
Many records have many related records through a junction table
68
Junction Table
Acts as a bridge between the first table and the composite key
69
6 types of Open source software
* Browser = FireFox * Application = Open Office * Web Server = Apache * Operating System = Linux * Mobile OS = Android * IRMS = MySQL