mis Flashcards

1
Q

Collaboration

A

is a group of people working together to
achieve a common goal via the process of feedback and
iteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cooperation

A

is a group of people working together, all doing essentially the same type of work, to accomplish a job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

groupthink

A

the desire for group cohesion by providing only positive feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

constructive criticism

A

both positive and negative advice given to improve an outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Successful Collaboration

A

Successful outcome. (Achieved objectives)
Growth in team capability over time.
Meaningful and satisfying experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

four primary purposes of collaboration

A

Become informed
– Share data & communicate interpretations.
– Develop & document shared understandings.

Make decisions.

Solve problems.

Manage projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Structured decisions

A

process where solution method is
understood and accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unstructured

A

process where there is no understood
and accepted solution method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

problem

A

is a perceived difference between what is
and what ought to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

problem solving task

A

-define the problem
-identify alternative solutions
-specify evaluation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

problem solving task 2

A

-evaluate alternatives
-select an alternative
-implement solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managing Projects

A

Starting, Planning, Doing, Finalizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Giving constructive criticism

A

Be specific, Offer Suggestions, Avoid personal comments, Set positive goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accepting constructive criticism

A

Question your emotions, Do not dominate, Demonstrate a commitment to the group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

examples of AI

A

Self-driving cars, robots, commercial drones, agricultural
systems, military platforms, surgical systems, and other
smart devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automation

A

is the process of making systems operate
without human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cloud computing

A

has advanced AI development because
it has made scalable resources available at very low
costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

benefits of automated Labor

A

-Can work 24 hours, 365 days
-Immediately trained, no “onboarding”
-No breaks during work hours
-No impaired workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

benefits of automated Labor 2

A

-No time-wasting activities
-No accidents or injuries
-No arguments with other employees or -managers
-No scheduling issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

strong AI

A

AI that can complete all of the
same tasks a human can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

imb watson

A

uses natural language processing (N L P),
or the ability of a computer system to understand spoken
human language, to answer questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Internet of Things (IoT)

A

is the idea that objects are becoming connected to the Internet so that they can interact with other devices, applications, or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Smart device

A

by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to internet with other devices and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Self-Driving Car

A

uses a variety of sensors to navigate like a traditional car.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

self-driving car pros

A

-Make things easier, cheaper, safer.
-Automobile accidents may become a thing of the past.
Car insurance eliminated (?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

self-driving car pros 2

A

-Eliminate need to have multiple cars
-Avoid costly traffic tickets, parking tickets, DUI citations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Augmented reality (AR)

A

is the altering of reality by overlaying digital information on real-world objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Mixed reality (MR)

A

is the combination of the real physical world with interactive virtual images or objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Virtual reality (VR)

A

a completely computer-generated virtual world with interactive digital objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cryptocurrencies

A

are digital-only currencies that use cryptographic protections to manage and record secure transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

3d printing

A

-Plastics, metals, wood, ceramics, foods, biological material.
-Opportunities in aerospace, defense, automotive, entertainment, and healthcare industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Business Intelligence Systems (BI)

A

are information systems that process operational, social, and other data to
identify patterns, relationships, and trends for use by business professionals and other knowledge workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Typical Uses of BI Systems

A

Changes in Purchasing Patterns (for marketing purposes)

BI for Entertainment – Ex: Spotify listening habits to determine locations where popular songs are heard most

Just-in-time Medical Reporting – Analyze records as they are entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Push Publishing

A

Delivers BI to users without request

35
Q

Pull Publishing

A

Requires user to request BI results

36
Q

Data Warehouse

A

is a facility for managing an organizations BI data

37
Q

Data Mart

A

is a smaller data collection for a department or functional area

38
Q

Functions of a data warehouse

A

obtain data, cleanse data, organize and relate data, catalog data

39
Q

Reporting Analysis

A

Process of sorting, grouping, summing, filtering, and formatting structured data

40
Q

Exception reports

A

Produced when something out of predefined bounds occurs

41
Q

Dynamic reports

A

BI documents that are updated at the time they are requested

42
Q

Data mining

A

Application of statistical techniques to find patterns and relationships among data for classification and prediction

43
Q

big data

A

a broad term for datasets so large or complex that traditional data processing applications are inadequate.
Huge volume, Rapid velocity, Generated rapidly

44
Q

threat

A

a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.

45
Q

vulnerability

A

is an opportunity for threats to gain access to individual or organizational assets.

46
Q

safeguard

A

is some measure that individuals or
organizations take to block the threat from obtaining the asset.

47
Q

target

A

is the asset that is desired by the threat

48
Q

Unauthorized data disclosure

A

occurs when a threat obtains data that is supposed to be protected

49
Q

Pretexting

A

occurs when someone deceives by pretending to be someone else.

50
Q

Phishing

A

occurs when someone pretends to be from a legitimate company sends an email requesting secure information.

51
Q

Sniffing

A

is a technique for intercepting computer communications.

52
Q

hackers

A

breaking into computers, servers, or networks to steal data, especially confidential data.

53
Q

Usurpation

A

occurs when computer criminals invade a
computer system and replace legitimate programs with their own.

54
Q

Denial of service (unintentional)

A

occur when someone inadvertently shut down a Web server or router by starting a
computationally intensive application.

55
Q

Denial-of-service attacks (intentional)

A

occurs when a malicious hacker floods a Web server with millions of bogus service requests that it cannot service legitimate requests

56
Q

Denial-of-service attacks (intentional)

A

occurs when a malicious hacker floods a Web server with millions of bogus service requests that it cannot service legitimate requests

57
Q

intrusion detection system (IDS)

A

is a computer program that senses when another computer is attempting to scan or access a computer or network IDS.

58
Q

brute force attack

A

is one in which the password cracker tries every possible combination of characters.

59
Q

identification

A

is by a username

60
Q

Authentication

A

is by a password selected by the user

61
Q

Encryption

A

is the process of transforming clear text into coded text for secure storage

62
Q

Malware

A

is a broad category of software that includes viruses, spyware, and adware

63
Q

Data safeguards

A

protect databases and other organizational data

64
Q

Human safeguards

A

involve the people and procedures components on information systems

65
Q

Data breach

A

happens when an unauthorized person views, alters, or steals secured data

66
Q

Direct cost of handling a data breach

A

Notification, Detection, Escalation, Remediation, Legal fees and consultation

67
Q

indirect cost of handling a data breach

A

loss of reputation, abnormal customer turnover, and increased customer acquisition activities

68
Q

personally identifiable information (PII)

A

data that can be used to identify a person.

69
Q

exploit

A

which is software used to take advantage of a newly discovered vulnerability in a target’s application or operating system.

70
Q

protecting yourself from data breaches

A

is understanding how they happen.

71
Q
A

Walkthrough- discuss the specific steps each person will take after a breach occurs.

Business continuity planning -session that is how to return to normal operations as quickly as possible.

Computer security incident response team (CSIRT) -consisting of staff from the legal and public relations departments as well as executives and systems administrators.

72
Q

countermeasures

A

are software or procedures used to prevent an attack.

73
Q

network intrusion detection system (NIDS)

A

used to examine traffic passing through Target’s internal network might have identified possible attacks.

74
Q

data loss prevention systems (DLP)

A

which are designed to prevent sensitive data from being released to unauthorized persons, could have been used to stop the data from leaving the internal network.

75
Q

strong password

A

A password that combines uppercase and lowercase letters, numbers, and symbols making the password difficult to guess.

76
Q

database

A

a self-describing collection of integrated records.

77
Q

metadata

A

data that describes data

78
Q

Database Management System (DBMS)

A

a program used to create, process, and administer a database

79
Q

Forms/reports/queries

A

Data entry forms used to read, insert. modify, and delete database data.

A presentation of data in a structured, meaningful context.

A request for data from a database.

80
Q

Hierarchy of Data

A

bits, characters, fields, records, files, and databases

81
Q

PRIMARY KEY

A

is a column or group of columns that identifies a unique row in a table.

82
Q

FOREIGN KEY

A

columns are keys, but they are keys of a different (foreign) table than the one in which they reside

83
Q

Non-traditional DBMS

A

a database that does not use the tabular schema of rows and columns found in most traditional database systems