Final Flashcards
A _________-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.
data
A ____________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
foriegn
A ____________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule
business
A ______________ is a collection of related data elements (in the MUSICIANS table these include)
record
A ________________ key is a field (or group of fields) that uniquely identifies a given record in a table
primary
A ___________database model stores information in the form of logically related two-dimensional tables
relational
A content ________ is the person responsible for updating and maintaining website content
editor
A content _________ is the person responsible for creating the original website content
creator
A data __________ is the smallest or basic unit of information
element
A data driven _________ is an interactive website kept constantly updated and relevant to the needs of its customers using a database
website
A database management system or _________creates, reads, updates, and deletes data in a database while controlling access and security
DBMS
A relational database management system allows users to create, read, update, and delete data in a relational _______________
database
A relational database model stores information in the form of logically related _________-dimensional tables
two
An __________________ stores information about a person, place, thing, transaction, or event
entity
Association ___________ reveals the relationship between variables along with the nature and frequency of the relationships
detection
broadly defined, a __________ maintains information about various types of objects, events, people, and places.
database
Business intelligence ____________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis
dashboards
Business-critical ___________ constraints enforce business rules vital to an organization’s success and often require more insight and knowledge than relational integrity constraints
integrity
Businesses collect a tremendous amount of _____________ information as part of their routine operations
transactional
Companies can gain valuable business knowledge by viewing the data accessed and analyzed from their ________
website
Data ___________ are logical data structures that detail the relationships among data elements using graphics or pictures
models
Data _____________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more
visualization
Data ______________ compiles all of the metadata about the data elements in the data model
dictionary
Data _______________ refers to the overall management of the availability, usability, integrity, and security of company data
governance
Data ___________________ describes technologies that allow users to “see” or visualize data to transform information into a business perspective
visualization
Data mining is the process of analyzing data to extract information not offered by the raw _______ alone
data
Data mining occurs on ____________ data that are already in a database or a spreadsheet
structured
Data warehouses can _____________ information like the example of gender
standardize
Databases today scale to exceptional levels, allowing all types of users and programs to perform _____________ processing and information-searching tasks
information
Dynamic __________ information is stored in a dynamic catalog , or an area of a website that stores information about products in a database
website
Extraction, transformation, and ___________ is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
loading
Information __________ issues occur when a system produces incorrect, inconsistent, or duplicate data
integrity
Information ___________ is a measure of the quality of information
integrity
Information ____________ occurs when the same data element has different values
inconsistency
Information ______________ is the duplication of data, or the storage of the same data in multiple places
redundancy
Information cleansing or __________ is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
scrubbing
Information is everywhere in an organization. Information ____________ refers to the extent of detail within the information
granularity
Integrity _________ are rules that help ensure the quality of information
constraints
Many firms complete data ___________ audits to determine the accuracy and completeness of its data
quality
Many organizations find themselves in the position of being data ___________ and information poor. Even in today’s electronic world, managers struggle with the challenge of turning their business data into business intelligence
rich
Of the two primary tools available for retrieving information from a DBMS, the first is a _______by example tool that helps users graphically design the answer to a question against a database
query
Organizations using business intelligence can find the cause to many issues and problems simply by asking the question _________
why
Real-time _______ means immediate, up-to-date information
information
Real-time ___________ provide real-time information in response to requests
systems
Relational _____________ constraints are rules that enforce basic and fundamental information-based constraints
integrity
0.15873 out of 0.15873 points
Relational _______________ constraints are rules that enforce basic and fundamental information-based constraints
integrity
The __________ view of information deals with the physical storage of information on a storage device
physical
The ___________ view of information focuses on how individual users logically access information to meet their own business needs
logical
The five common characteristics of high-quality include accurate, complete, __________, timely and unique
consistent
The primary purpose of a data ___________ is to combine information, specifically, strategic information, throughout an organization into a single repository in such a way that the people who need that information can make decisions and undertake business analysis
warehouse
Time-series information is time-stamped information collected at a particular _______
frequency
Two of the challenges businesses faced before data warehouses were lack of data standards and poor data ______
quality
Unstructured __________ does not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on
data
Zappos credits its success as an online _________ retailer to its vast inventory of nearly 3 million products available through its dynamic data-driven website
shoe
______ information includes data that change based on user actions
dynamic
_______ information includes fixed data incapable of change in the event of a user action
static
_______ mining analyzes unstructured data associated with websites to identify consumer behavior and website navigation
web
_______ visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized
data
_________ displays information graphically so it can be easily understood
infographics
___________ provides details about data
metadata
______________ can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time
infographics
_________ is accessing large amounts of data from different management information systems
informing
___________ are the data elements associated with an entity
attributes
A _________ is a single unit of binary data routed through a network
packet
A __________ is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
proxy
A ___________ area network connects a group of computers in close proximity, such as in an office building, school, or home
local
A ___________ area network is a large computer network usually spanning a city, and is used by colleges, universities, and large companies that span their campuses
metropolitan
A ___________ is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area
satellite
A ___________ is a standard that specifies the format of data as well as the rules to be followed during transmission
protocol
A ___________ metropolitan area network uses radio signals to transmit and receive data
wireless
A ____________ receives and repeats a signal extending its attenuation or range
repeater
A _____________ is a round coin-sized object, is uniquely numbered and hidden in geocache
geocoin
A metropolitan area network (MAN) is a large computer network usually spanning a _______
city
An ___________ is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers
extranet
Automatic _________ location (AVL) uses GPS tracking to track vehicles
vehicle
Network _____________is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
convergence
One benefit of a connected world, resource ___________ makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user
sharing
One of the main benefits of business mobility is enhancing _____________, which gives a company the power to place the right resources in the right place at the right time
mobility
Protecting against theft can expose a company to many significant risks such as stolen IDs, __________, encryption keys, and even confidential company information
passwords
Providing immediate data ______________, is an advantage of wireless networks, and includes the ability to have instant access to customer profiles, account history, and current order status which can improve the quality of interactions with customers and business partners
access
Providing network access to those who want or need it helps to level the playing field and removes the digital _____________, a worldwide gap giving advantage to those with access to technology
divide
RFID _______________ is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
accelerometer
RFID tag is an electronic identification device that is made up of a __________ and antenna
chip
Radio frequency ___________ uses electronic tags and labels to identify objects wirelessly over short distances
identification
Routing information, sending information alerts, mapping densities and quantities are all examples of ___________ information systems
geographic
Secure hypertext transfer _____________ is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
protocol
Secure socket ____________ is a standard security technology for establishing an encrypted link between a Web server and a browser, ensuring that all data passed between them remain private
layer
Semi-passive RFID tags use a ______________ to run the microchip’s circuitry, but communicate by drawing power from the RFID reader.
battery
The U.S. Department of Defense developed this technology in the early 1970s, a global ____________ system where satellite-based navigation systems provide extremely accurate position, time, and speed information
positioning
The ability to ___________ and monitor assets reduces losses from theft and damage, gathers information from remote or difficult-to-reach locations, enhances safety, and makes possible a new wave of personalized services
locate
The largest and most important network, the ______________, is like a network made up of millions of smaller networks able to operate independently
internet
The packet ____________ lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data
header
The packet ______________ represents the end of the packet or transmission end
footer
To create an SSL connection, a Web server requires an SSL _____________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company
certificate
War ___________ is deliberately searching for Wi-Fi signals while driving by in a vehicle
driving
0.15625 out of 0.15625 points
War _____________ is the practice of tagging pavement with codes displaying where Wi-Fi access is available
chalking
We measure network performance in terms of _______________, the maximum amount of
data that can pass from one point to another in a unit of time.
bandwidth
Wired ______________ privacy (WEP) is an encryption algorithm designed to protect wireless transmission data
equivalent
Wireless ____________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
fidelity
________ RFID tags have their own transmitter and a power source (typically a battery)
active
______ RFID tags do not have a power source
passive
______ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention
asset
_______ directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets
packets
_______ matching (warping, rubber sheeting) occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match
edge
________ data identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data
spatial
_______ enable customers, suppliers, consultants, subcontractors, business prospects, and others to access selected intranet websites and other company network resources that allow the sharing of information
extranets
___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred
streaming
_______ over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems
broadband
_______ packet formats include a packet header, packet body containing the original message, and packet footer
standard
________ professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data
GIS
_______ represents an east/west measurement of position
longitude
_________-based services are applications that use location information to provide a service. Some examples include mapping, emergency services, navigation, and weather information
location
_________ address is a unique number that identifies where computers are located on the network
IP
__________ offer many advantages for business including sharing resources, providing opportunities, and reducing travel
networks
__________ service providers (NSPs), private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI (previously UUNet/WorldCom), AT&T, NTT, Level3, Century Link, and Cable & Wireless Worldwide
national
__________ RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip
chipless
__________ communications (UC) is the integration of communication channels into a single service. UC integrates communication channels allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and VoIP.
unified
_______ in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
geocoding
______________ is a utility application that monitors the network path of packet data sent to a remote computer
traceroute
______________ represents a north/south measurement of position
latitude
_______ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals
attenuation
____________ information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica
geographic
______________ Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
dynamic
_____________ is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps
cartography
___________________ allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data
telecommunicating
_________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
geocache
___________________ service providers (RSPs) offer Internet service by connecting to NSPs, but they also can connect directly to each other.
regional
“Why did sales not meet forecasts?” is an example of _________ technologies in CRM
analyzing
A _________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes
forward
A _________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes
backward
A(n) _________ allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems
integration
A(n) _________ system is a current or existing system that will become the base for upgrading or integrating with a new system
legacy
Accounting and finance components manage accounting data and ______________ processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
financial
Accounting, finance, logistics, and production are the primary users of ___________ systems
ERP
An organization can find its most valuable customers by using a formula that industry insiders call Recency, ______________, and Monetary Value
frequency
Business intelligence, customer relationship management, supply chain management, and __________ are the four most common extended ERP components
ebusiness
Collaborative ___________ planning helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability
demand
Collaborative ______________ allows an organization to reduce the cost and time required during the design process of a product
engineering
Contact center, web-based self-service, and __________ scripting are the three primary operational CRM technologies used in the customer service department
call
Cross-selling is selling _________ products or services to a customer.
additional
Customer relationship management involves managing all aspects of a customer’s relationship with an organization to increase customer ____________ and retention and an organization’s profitability
loyalty
Distribution of products flow from customers and their _____________ customers at all levels
downstream
Enterprise _____________ integration connects the plans, methods, and tools aimed at integrating separate enterprise systems
application
Enterprise resource planning integrates all departments and functions through an organization into a ________ IT system so that employees can make decisions by viewing enterprisewide information on all business operations
single
Enterprise resource planning systems ______________ all departments and functions throughout an organization into a single IT system
integrate
Human resource component is one of the three most common _________ ERP components
core
Human resource components have the ability to identify employees that are likely to ________ the company
leave
Human resource components track ___________ information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities
employee
Integrations are achieved by using ___________
middleware
List ____________ compile customer information from a variety of sources and segment the information for different marketing campaigns
generators
List generator, ________ management, and cross-selling/up-selling are the three primary operational CRM technologies used in the marketing department
campaign
Materials flow from suppliers and their _______________ suppliers at all levels
upstream
McDonald’s is _________ selling when it asks their customers if they would like an apple pie with their meal
cross
McDonald’s is ____________ selling when it asks their customers if they would like to super-size their meals
up
Most organizations manage their relationships with customers by setting ___________ limits
credit
Production and materials management components handle the various aspects of production planning and execution such as __________ forecasting, production scheduling, job cost accounting, and quality control
demand
Sales management, contact management, and __________ management are the three primary operational CRM technologies used in the sales department
opportunity
Sales, marketing, and customer service are the primary users of ______ systems
CRM
Supply chain ________ management enables an organization to react more quickly to resolve supply chain issues.
event
Supply chain management involves the management of ___________ flow between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
information
The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting
analyzing
The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting
analyzing
______ and materials management is one of the three most common core ERP components
production
_______ chain management applies technology to the activities in the order life cycle from inquiry to product delivery
selling
______ dialing automatically dials outbound calls and when someone answers, the call is forwarded to an available agent
predictive
______ management systems maintain customer contact information and identify prospective customers for future sales
contact
______ management systems target sales opportunities by finding new customers or companies for future sales
opportunity
____ relationship management focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
partner
____ technologies help organizations identify their customers across applications
reporting
_____ management systems automate each phase of the sales process, helping individual sales representatives coordinate and organization all of their accounts
sales
______ CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
analytical
_____ CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
operational
______ management systems guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
campaign
_______ office operations deal directly with the customer
front
_____ relationship management focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection
supplier
______ scripting systems access organizational databases that track similar issues or questions and automatically generate the details to the CSR who can then relay them to the customer
call
____ systems provide enterprisewide support and data access for a firm’s operations and business processes
enterprise
_______ ERP components are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
extended
_______ integration is the integration of a company’s existing management information systems
application
______ integration is the integration of data from multiple sources, which provides a unified view of all data
data
_______ ERP components are the traditional components included in most ERP systems and they primarily focus on internal operations
core
________ application integration middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors
enterprise
__________ is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources
eintegration