Exam 1 Flashcards

1
Q

Internet of things

A

A world where interconnected, Internet-enabled devices or “things” have the ability to collect and share data without human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Big data

A

a collection large, complex datasets, which cannot be analyzed using traditional database methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of structure data

A

has a defined length, type, and format and includes numbers, dates, or strings such as a relational database or spreadsheet and accounts for about 20% of the data that surrounds us. Sources of structure data include: machine generated data & human-generated data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management information systems what is it

A

A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving e.g. CEO, CFO, COO, CIO, CDO, CTO, CSO, CPO, CKO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Competitive advantage

A

a feature of product or service on which customers place greater value than they do on similar offerings from competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Swot analysis

A

Strengths
Weaknesses
Threats
Opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Porter three generic strategies

A

Generic business strategies that are neither organization nor industry specific and can be applied to any business, product, service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business Intelligence

A

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationships for strategic decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System Thinking

A

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback from each part

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operation decision making level

A

Operational decisions are considered structured decisions. They are decisions that are needed to run the business in a day to day sense. There is not a lot of thought behind these decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is decision making process of

A

The process of viewing/analyzing information and figuring out the best response or course of action to take to ensure the desired outcome / best result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The six step process of decision making

A

Problem Identification
Data collection
Solution Generation
Solution Test
Solution Selection
Solution Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Visualization

A

a technique / tool used by executive information systems to deliver specific key information to top managers at a glance, with little or no interaction with the system e.g. infographics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

KPI

A

Key performance indicators; The quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Metrics

A

Critical success factors focusing on effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decision support system(DSS)

A

Model information using OLAP, which provides assistance evaluating and choosing among different courses of action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Granularity

A

The level of detail in the model or decision making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Machine Vision Resolution

A

The extent to which a machine can differentiate between objects. In general, the better the resolution, the more confined the field vision . Sensitivity and resolution reduces the resolution, and improving the resolution reduces the sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Mining

A

the process of sorting through large data sets to identify patterns & relationships that can help solve business problems through data analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Business Process Modeling

A

also referred to as mapping: the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.

21
Q

Disruptive technology

A

A new way of doing things that initially does not meet the needs of existing customers

22
Q

Web 2.0 -

A

The next generation of Internet use- a more mature distinctive communications platform characterized by new qualities such as collaboration, sharing and being free

23
Q

Web 3.0

A

Based on “intelligent” web applications using natural language processing, machine-based learning and reasoning, and intelligent applications. Its the next step in the evolution of the Internet and web applications. It offers a way for people to describe information such that computers can start to understand the relation among concepts and topics. It brings machines closer together using information

24
Q

WWW

A

Provides access to internet information through documents, including text, graphics, and audio and video files that use a special formatting language called hypertext markup language

25
Q

4 Business models B2B

A

B2B
B2C
C2C
C2B

26
Q

E business tools for connecting and communicating

A

Email, podcasting, video chat, instant message, content management

27
Q

Source Code

A

text listing of commands to be compiled or assembled into an executable computer program.

28
Q

Deep Web

A

the large part of the internet that is inaccessible to conventional search engines

29
Q

Semantic Web

A

a component of Web 3.0 that describes things in a way that computers can understand

30
Q

Zombie

A

A program that secretly takes over another computer for the purpose of launching attacks on other computers. Zombie attacks are almost impossible to trace back to the attacker.
A zombie is a device infected by malware but it is being remotely controlled

31
Q

Trojan -

A

A trojan is anything that disguises itself as a normal good program but has disguised malware that will be implemented into the computer.

32
Q

Trojan horse virus

A

hides inside other software, usually as an attachment or a downloadable file
Set on syllabus?

33
Q

Information securities

A

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

34
Q

Intrusion detection system/software (IDS)

A

software protects against suspicious network traffic and attempts to access files and data. Features full-time monitoring tools that search for patterns in network traffic to identify intruders.

35
Q

Hacker

A

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

36
Q

Network behavior analysis -

A

Gathers an organization’s computer network traffic patterns to identify unusual or suspicious operations

37
Q

Social engineering

A

occurs when hackers use their social skills to trick people into revealing access credentials or other valuable information

38
Q

Pretexting

A

form of social engineering in which one individual lies to obtain confidential data about another individual

39
Q

Dumpster diving

A

occurs when a hacker looks through people’s trash to obtain information.

40
Q

Insiders

A

legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. For example many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers.

41
Q

Cyberattacks

A

Malicious attempts to access or damage a computer system. Cyberattakcs have the following attributes:
Use computers, mobile phones, gaming systems, and other devices
Include identity theft
Block your access or delete your personal documents and pictures
Target children
Causes problems for business services, transportation, and power

42
Q

Dive-by hacking

A

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and or sends attack instructions without entering the office or organization that owns the network

43
Q

Spoofing

A

the forging of the return address on an email so that the message appears to come from someone other than the actual sender. This is not a virus byt rather a way by which virus authors conceal their identities as they send out viruses

44
Q

Malicious Code

A

includes a variety of threats such as viruses, worms, and trojan horses

45
Q

Packet tampering

A

consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network. For example, an attacker might place a tap on a network line to intercept packets as they leave the computer. The attacker could eavesdrop or alter the information as it leaves the network.

46
Q

Worm

A

spreads itself not only from file to file but also from computer to computer

47
Q

Denial of service (DoS)

A

floods a website with so many requests for service that it slows down or crashes

48
Q

Ransomware

A

a form of malicious software that infects your computer and asks for money