MIS 301 Final Flashcards

(58 cards)

1
Q

decision tree analysis

A

a technique used to create hierarchical if/then rules using several variables to predict a class of a record, for example use on data, income, gender, homeownership, to predict good/bad risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cluster analysis

A

a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible, ex: data driven profiling using many variables to generate clusters of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

association detection

A

reveals the degree to which variables are related, and the nature and frequency of these relationships in the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

statistical analysis

A

performs such functions as correlations, distributions, calculations, variance analysis, and regression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

classification

A

asign records to one of a predefined set of classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

estimation

A

determine values for an unknown continuous variable behaviour or estimated future value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

affinity grouping

A

determine which things go together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

clustering

A

segment a heterogeneous population of records into a number of more homogenous subgroups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Richard Hackthorn’s graphic on value of BI

A

[order is important] data latency, analysis latency, decision latency, action taken. this is the time it takes to make an action and why business intelligence is useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

quantifiable benefits

A

working time saved in producing reports, selling info to suppliers, etc. [ex. moet and chandon reducing from .30 to .15 per bottle]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

indirectly quantifiable benefits

A

can be evaluated through indirect evidence - improved customer service means new business from the same customer and differentiated service brings new customers. [ex: owens and minor cited that extranet access to the data warehouse as the primary reason for giving 44m in new bsiness]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unpredictable benefits

A

are the result of discoveries made by creative users [ex. volkswagen discovering that audi customers and vw customers behave differently based on socioeconomic profiles]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

intangible benefits

A

include improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

forecast

A

predictions made based on time series information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

time series info

A

time stamp information collected at a particular frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

statistical analysis

A

performs such functions as information correlations, distributoins, calculations, and variance analysis [ex regression] includes forecast and time series information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OLAP

A

online analytical processing is the manipulation of information to create busienss intelligence in support of strategic decision making (executive end)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OLTP

A

online transaction processing is the capture of transaction and event information using technology to process the information according to designed business rules, store the info, and update existing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ETL

A

extraction, transformation, loading / a process that extracts information from internal and external databases, transforms info using a common set of enterprise definitions, and loads the informatino to a data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dimensions

A

the who, what, where, when and how criteria of a query [ex: store 123 product abc promo 123]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

facts

A

the sales number in each cell at the intersection of dimension values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

multidimensional analysis

A

a pivot table is an example of multidim analysis, the columns fields, rows fields, and page fields are dimensions. the data in the center is a fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

info security

A

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization [ex: 38% of security incidents originate within the org]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

phishing

A

a technique to gain personal information for the purpose of identity theft or bank information

25
social engineering
using social skills to trick people into revealing info
26
token
small electronic device that changes user passwords automatically
27
smart card
a device size of credit card containing embedded technologies that can store info and small amounts of software to perform some limited processing
28
biometrics
narrowly definied/ the identification of a user based on physical characteristics such as fingerprints, iris, face, voice, or handwriting. can be costly and intrusive.
29
pharming
re-routes requests for legitimate websites to false websites
30
authentication
a method for confirming users' identities / once a system determines the authentication of a user it can then determine the access priveliges, or authorization for that user
31
authorization
the process of providing a user with permission including access levesl and abilites such as file acces, hours of access, and amount of allocated storage space
32
firewall
a hardware and or software that guards a private network by analyzing incoming and outgoing information for the correct markings
33
content filtering
occurs when orgs use software that filters content such as emails to prevent the accidental or malicious transmission of unauthorized information
34
what are technologies available to help prevent and build resistance to attacks?
content filtering, encryption, and firewalls
35
public key encryption (PKE)
uses two keys: a public key that everyone can have and a private key for only the recipient. the org provides the pubic key to all customers whether end consumers or other businesses. when it arrives at its destination the org uses the private key to unscramble it.
36
DDoS/DoS attack
denial of service attack: floods a website with so many request for service that it slows down or crashes the site // distributed denial of service attack: attacks from multple computers flooding websites with requests
37
black hat hacker
breaks into other peoples computers
38
white hat hacker
work at the request of system owners to find system vulnerabilities and plug the holes
39
worm
spreads itself not only file to file but also computer to computer. the difference between virus and worm: virus must attach to something. worms do not need to attach to anything to spread and can tunnel themselves into computers. they also replicate themselves.
40
script kiddies/bunnies
find hacking code on the internet and click and point their way into systems causing damage or spreading viruses
41
porter's 3 generic strategies
1. broad cost leadership 2. broad differentiation 3. focus strategy [ex: mercedes benz would find itself facing the dilemna of attempting to market and sell a highly specialized and expensive product at a discounted price] competitive scope and cost strategy
42
porter's 5 forces
1. threat of substitute products or services 2. buyer power 3. rivalry amongst existing competitors 4. threat of new entrance 5. supplier power [rivalry amongst existing compettitors in the center]
43
value chain analysis
views a firm as a series of business procsses that each add value to the product or serivice
44
environmental scanning
organiztions watch their competition through enviro scanning
45
business process
a standardized set of activities that accomplish a specific task such as processing a customer's order
46
organizational strategy
a leadership plan that achieves a specific set of goals or objectives, such as developing new products/services, entering new markets, increasing customer loyalty, attracting new customers, and increasing sales
47
first mover advantage
occurs when an org can significantly impact its market share by being first to market with a competitive advantage
48
IT strategy
organizational strategy, articulates how the company will make/sustain profits in face of competition. IT strategy developed by senior IT mangers articulates how IT will contribute to the realization of organizational strategy.
49
buyer power
the ability of buyers as a group to directly impact the price they are wiling to pay for an item. measured by # customers, size of orders, sensitivity to price
50
switching costs
costs that can make customers reluctant to switch to another product or service, i.e. loyalty programs
51
supplier power
the supplier's ability to influence the prices they charge for supplies
52
supply chain
consists of all parties involved in the procurement of a product or raw material
53
threat of substitute
high when there are many alternatives to aproduct or service and low when there are few
54
how to properly identify a primary key and a foreign key
a primary key gets underlined; a foreign key gets dotted underlined
55
referential integrity
states that every non-null foreign key value must match an existing primary key value. this ensures the consistency of the cross references among tables.
56
redundancy
the duplication of information or storing same info in multiple places; can result in inconsistencies
57
what does a table, row, and column represent
table: data sheet. row: contains all data for a single record column: a specific data value called a field; all records have the same fields
58
aggregate functions
(total functions) sum, minimum, maximum, average, count, variance, standard deviations. aggregate functions operate on a group of rows with a common criterion.