FINAL B6 Flashcards
What is a Decision support system?
computer-based information systems that provide interactive support to managers or others during the decision-making process
What are examples of DSS
Database query applications
Financial modeling applications
Sensitivity analysis application
What is the primary objective of data security controls?
To ensure that storage media are subject to authorization prior to access, change, or destruction
What is the impact of JIT inventory on suppliers
few number of suppliers
What is six sigma?
Quality improvement program that uses metrics to evaluate the achievement of goals. A improvement process include reducing defective products outputs
What are the disadvantages of outsourcing?
Quality of service, security issues and language barriers
What are the parts of TQM?
Customer needs
continuous improvement
Quality circles
What is the objective of lean manufacturing?
Waste reduction ( NOT quality)
Define Kaizen analysis
occurs at mfg stage where there is ongoing search for cost reductions take the form of analysis to ensure that resource uses stay within target costs
What is an ERP designed to do?
Integrate data from all aspects of an organizations activities
What are the components of a Business Information System?
Hardware, software, network, people, and data
What is a reason a company would switch to cloud computing?
Lower upfront costs for equipment and maintenance
What is an Executive Information system?
Provides senior executives with immediate and easy access to internal and external information to assist the executives in strategic issues (analysis of cyclical data, acquisitions and competitor behavior)
Define a hot site
Location that is equipped with the necessary hardware and possibly software
Define decryption
the intended recipient converts the cipher text into plain text
What is a Public Key Infrastructure?
Refers to the system and processes used to issue and manage asymmetric keys and digital certificate
What is used as a method of to encrypt and decrypt a message in asymmetric encryption?
a public key is used to encrypt the message and a private key is used to decrypt the message
what is one way to detect computer-related fraud
Reviewing the systems-access log
Define a denial of service attack
attack in which one computer bombards another computer with a flood of information
Define transaction processing
term used to describe processing large number of common business events that are processed in a predefined highly structed way
What is the role of a database admin?
Maintains and supports its database systems
What is the role of a network admin?
Supports it own internal networks by monitoring performance of those networks and troubleshoot any problems
Can a database admin and network admin be the same person?
yes
Define cloud computing
Allows organizations to use the internet to access and use services and applications that run on remote TP tech infrastructure
What is the adv of an ERP over a multi independent functional system?
Increased responsiveness and flexibility while aiding in the decision-making process
What is a predictive analytic
Uses statistical techniques and forecasting models to predict what could happen
What is a descriptive analytic
describes events that have already happened