Tech esp Flashcards

(33 cards)

1
Q

Executive support system ESS or Executive information system EIS

A
  • Usually used by senior management or directors
  • Uses data from internal and external sources to make information
  • Hopes senior manages to make strategic, unstructured decisions
  • Predictive probability forecasted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Management information systems MIS

A

Convert dates for Main and sources like summary reports

Help manages to make a timely and effective decisions for planning directing and controlling the activities they are responsible for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decision support system DSS

A

Combine states and analytical models or data analysis was to support semi structured and unstructured decision meeting so essentially a mixture of num and written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Expert system eg Medical system to diagnosed of illness

A

System will consist of database holding specialised data and rules about what to do in or how to separate a given set of circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Knowledge work systems KWS

A

Facilitate the creation and integration of new knowledge into an organisation eg project management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Office automation system OAS

A

Systems that increase the productivity of data and information workers e.g. email, word, Google Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cloud computing?

A

Storage software that is used through the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three characteristics of cloud?

A

It’s sold on demand and build by minutes or hour

It’s elastic meaning that uses access as much as little as

It’s fully managed by the provider meaning that the user just needs a device and Internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give three limitations of cloud computing

A

Data is held centrally so not only gonna be accessed by many uses at once, but it can also be up-to-date for all users
Cloud providers handle the backup process

The cloud providers handle updates the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Internet of things?

A

The connection of competing devices to the Internet. The devices take And turn it into information Like thermostats, gas, and electricity meters And black boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital assets

A

A source of revenue
Intangible asset
Bitcoin
Data and information created and stored digitally can be a form of digital asset so like photos, films, videos drawings et cetera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is blockchain

A

Is a method of recording transactions in such a way that is nearly impossible to go back and change the history to fraudulently to make the records more favourable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are cryptocurrencies?

A

Cryptocurrencies are digital tokens and people can trade with them online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are risks that comes With digital currencies

A

The value of digital currencies are volatile and are subject to market forces

Online digital wallets can be hacked

Criminals to avoid money laundering regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fintech

A

Lower cost operation that’s why it’s attractive

Crowdfunding- Ask for money online

Pair 2 pair lending
Digital wallets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cognitive technologies: Artificial intelligence

A

Where a computing device has been programmed to think like a human. it uses an intuition to make decisions based on past experience and reasoning to come to a conclusion. like also in keyboard suggestions

17
Q

Cognitive technologies: Machine learning

A

A computing device is able to develop its own rules rather than follow a pre-program logic. The machine will attempt to predict what will happen based on pattern.

18
Q

Cognitive tech: robotic process automation

A

Pre-programmed robot with a degree of machine learning for example a software robot watches how use your phone and starts to make suggestions like setting alarms

19
Q

Obsolescence risk

A

Businesses have to invest in technologies to stay competitive as a risk that the investment becomes a wasted due to obsolescence

20
Q

Name the risks that comes with companies investing in new technology to stay competitive

A

Sourced activity, so the risk is placed upon the outsourcer

Invest in technologies that have the capability to be updated

Invest in technologies that have a shorter payback period

21
Q

What is an inexplicability risk?

A

As a computer becomes more and more powerful algorithms used becomes so complicated like humans cannot understand them and it can be difficult to check and explain result

22
Q

What is data protection?

A

Companies should only use data provided by individuals for the purposes Originally intended, however, data artificial intelligence processes could attempt companies to use data of a different means or hold onto the data longer than they should

23
Q

What is automation risks?

A

As companies move from human processes activities to those processed by software robots and learning machines a new set of skills is required to ensure processing is taking place as expected

24
Q

Give 2 ethical risks

A

If a machine makes a mistake, who is the blame?

How can machines make ethical decisions?

25
What is hacking
Criminals gained access to computer networks that for able to steal, amend and delete record
26
What is Phishing
Burgers emails that ask for user security information and personal details
27
File hijacker/ ransomare
Where the uses files are hacked and held for ransom
28
WebCam manager
Where the users WebCam is taken over
29
Key logging
Where criminals record what the user types into the keyboard
30
Screenshot manager
Where screenshots are taken of the users computer screen
31
Distributed denial of service DDOS
The use of botnets to drop online services by overwhelming a website with a wave of traffic that the system is unable to hand
32
Ad clicker
Where Uses computer is directed to A click a specific link
33