mis Flashcards

1
Q

Collaboration

A

is a group of people working together to
achieve a common goal via the process of feedback and
iteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cooperation

A

is a group of people working together, all doing essentially the same type of work, to accomplish a job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

groupthink

A

the desire for group cohesion by providing only positive feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

constructive criticism

A

both positive and negative advice given to improve an outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Successful Collaboration

A

Successful outcome. (Achieved objectives)
Growth in team capability over time.
Meaningful and satisfying experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

four primary purposes of collaboration

A

Become informed
– Share data & communicate interpretations.
– Develop & document shared understandings.

Make decisions.

Solve problems.

Manage projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Structured decisions

A

process where solution method is
understood and accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unstructured

A

process where there is no understood
and accepted solution method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

problem

A

is a perceived difference between what is
and what ought to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

problem solving task

A

-define the problem
-identify alternative solutions
-specify evaluation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

problem solving task 2

A

-evaluate alternatives
-select an alternative
-implement solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managing Projects

A

Starting, Planning, Doing, Finalizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Giving constructive criticism

A

Be specific, Offer Suggestions, Avoid personal comments, Set positive goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accepting constructive criticism

A

Question your emotions, Do not dominate, Demonstrate a commitment to the group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examples of AI

A

Self-driving cars, robots, commercial drones, agricultural
systems, military platforms, surgical systems, and other
smart devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automation

A

is the process of making systems operate
without human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cloud computing

A

has advanced AI development because
it has made scalable resources available at very low
costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

benefits of automated Labor

A

-Can work 24 hours, 365 days
-Immediately trained, no “onboarding”
-No breaks during work hours
-No impaired workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

benefits of automated Labor 2

A

-No time-wasting activities
-No accidents or injuries
-No arguments with other employees or -managers
-No scheduling issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

strong AI

A

AI that can complete all of the
same tasks a human can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

imb watson

A

uses natural language processing (N L P),
or the ability of a computer system to understand spoken
human language, to answer questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Internet of Things (IoT)

A

is the idea that objects are becoming connected to the Internet so that they can interact with other devices, applications, or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Smart device

A

by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to internet with other devices and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Self-Driving Car

A

uses a variety of sensors to navigate like a traditional car.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
self-driving car pros
-Make things easier, cheaper, safer. -Automobile accidents may become a thing of the past. Car insurance eliminated (?)
26
self-driving car pros 2
-Eliminate need to have multiple cars -Avoid costly traffic tickets, parking tickets, DUI citations
27
Augmented reality (AR)
is the altering of reality by overlaying digital information on real-world objects.
28
Mixed reality (MR)
is the combination of the real physical world with interactive virtual images or objects.
29
Virtual reality (VR)
a completely computer-generated virtual world with interactive digital objects.
30
Cryptocurrencies
are digital-only currencies that use cryptographic protections to manage and record secure transactions
31
3d printing
-Plastics, metals, wood, ceramics, foods, biological material. -Opportunities in aerospace, defense, automotive, entertainment, and healthcare industries.
32
Business Intelligence Systems (BI)
are information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers
33
Typical Uses of BI Systems
Changes in Purchasing Patterns (for marketing purposes) BI for Entertainment – Ex: Spotify listening habits to determine locations where popular songs are heard most Just-in-time Medical Reporting – Analyze records as they are entered
34
Push Publishing
Delivers BI to users without request
35
Pull Publishing
Requires user to request BI results
36
Data Warehouse
is a facility for managing an organizations BI data
37
Data Mart
is a smaller data collection for a department or functional area
38
Functions of a data warehouse
obtain data, cleanse data, organize and relate data, catalog data
39
Reporting Analysis
Process of sorting, grouping, summing, filtering, and formatting structured data
40
Exception reports
Produced when something out of predefined bounds occurs
41
Dynamic reports
BI documents that are updated at the time they are requested
42
Data mining
Application of statistical techniques to find patterns and relationships among data for classification and prediction
43
big data
a broad term for datasets so large or complex that traditional data processing applications are inadequate. Huge volume, Rapid velocity, Generated rapidly
44
threat
a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.
45
vulnerability
is an opportunity for threats to gain access to individual or organizational assets.
46
safeguard
is some measure that individuals or organizations take to block the threat from obtaining the asset.
47
target
is the asset that is desired by the threat
48
Unauthorized data disclosure
occurs when a threat obtains data that is supposed to be protected
49
Pretexting
occurs when someone deceives by pretending to be someone else.
50
Phishing
occurs when someone pretends to be from a legitimate company sends an email requesting secure information.
51
Sniffing
is a technique for intercepting computer communications.
52
hackers
breaking into computers, servers, or networks to steal data, especially confidential data.
53
Usurpation
occurs when computer criminals invade a computer system and replace legitimate programs with their own.
54
Denial of service (unintentional)
occur when someone inadvertently shut down a Web server or router by starting a computationally intensive application.
55
Denial-of-service attacks (intentional)
occurs when a malicious hacker floods a Web server with millions of bogus service requests that it cannot service legitimate requests
56
Denial-of-service attacks (intentional)
occurs when a malicious hacker floods a Web server with millions of bogus service requests that it cannot service legitimate requests
57
intrusion detection system (IDS)
is a computer program that senses when another computer is attempting to scan or access a computer or network IDS.
58
brute force attack
is one in which the password cracker tries every possible combination of characters.
59
identification
is by a username
60
Authentication
is by a password selected by the user
61
Encryption
is the process of transforming clear text into coded text for secure storage
62
Malware
is a broad category of software that includes viruses, spyware, and adware
63
Data safeguards
protect databases and other organizational data
64
Human safeguards
involve the people and procedures components on information systems
65
Data breach
happens when an unauthorized person views, alters, or steals secured data
66
Direct cost of handling a data breach
Notification, Detection, Escalation, Remediation, Legal fees and consultation
67
indirect cost of handling a data breach
loss of reputation, abnormal customer turnover, and increased customer acquisition activities
68
personally identifiable information (PII)
data that can be used to identify a person.
69
exploit
which is software used to take advantage of a newly discovered vulnerability in a target's application or operating system.
70
protecting yourself from data breaches
is understanding how they happen.
71
Walkthrough- discuss the specific steps each person will take after a breach occurs. Business continuity planning -session that is how to return to normal operations as quickly as possible. Computer security incident response team (CSIRT) -consisting of staff from the legal and public relations departments as well as executives and systems administrators.
72
countermeasures
are software or procedures used to prevent an attack.
73
network intrusion detection system (NIDS)
used to examine traffic passing through Target's internal network might have identified possible attacks.
74
data loss prevention systems (DLP)
which are designed to prevent sensitive data from being released to unauthorized persons, could have been used to stop the data from leaving the internal network.
75
strong password
A password that combines uppercase and lowercase letters, numbers, and symbols making the password difficult to guess.
76
database
a self-describing collection of integrated records.
77
metadata
data that describes data
78
Database Management System (DBMS)
a program used to create, process, and administer a database
79
Forms/reports/queries
Data entry forms used to read, insert. modify, and delete database data. A presentation of data in a structured, meaningful context. A request for data from a database.
80
Hierarchy of Data
bits, characters, fields, records, files, and databases
81
PRIMARY KEY
is a column or group of columns that identifies a unique row in a table.
82
FOREIGN KEY
columns are keys, but they are keys of a different (foreign) table than the one in which they reside
83
Non-traditional DBMS
a database that does not use the tabular schema of rows and columns found in most traditional database systems