MIS 301 Final Flashcards

1
Q

decision tree analysis

A

a technique used to create hierarchical if/then rules using several variables to predict a class of a record, for example use on data, income, gender, homeownership, to predict good/bad risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cluster analysis

A

a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible, ex: data driven profiling using many variables to generate clusters of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

association detection

A

reveals the degree to which variables are related, and the nature and frequency of these relationships in the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

statistical analysis

A

performs such functions as correlations, distributions, calculations, variance analysis, and regression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

classification

A

asign records to one of a predefined set of classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

estimation

A

determine values for an unknown continuous variable behaviour or estimated future value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

affinity grouping

A

determine which things go together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

clustering

A

segment a heterogeneous population of records into a number of more homogenous subgroups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Richard Hackthorn’s graphic on value of BI

A

[order is important] data latency, analysis latency, decision latency, action taken. this is the time it takes to make an action and why business intelligence is useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

quantifiable benefits

A

working time saved in producing reports, selling info to suppliers, etc. [ex. moet and chandon reducing from .30 to .15 per bottle]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

indirectly quantifiable benefits

A

can be evaluated through indirect evidence - improved customer service means new business from the same customer and differentiated service brings new customers. [ex: owens and minor cited that extranet access to the data warehouse as the primary reason for giving 44m in new bsiness]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unpredictable benefits

A

are the result of discoveries made by creative users [ex. volkswagen discovering that audi customers and vw customers behave differently based on socioeconomic profiles]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

intangible benefits

A

include improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

forecast

A

predictions made based on time series information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

time series info

A

time stamp information collected at a particular frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

statistical analysis

A

performs such functions as information correlations, distributoins, calculations, and variance analysis [ex regression] includes forecast and time series information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OLAP

A

online analytical processing is the manipulation of information to create busienss intelligence in support of strategic decision making (executive end)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OLTP

A

online transaction processing is the capture of transaction and event information using technology to process the information according to designed business rules, store the info, and update existing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ETL

A

extraction, transformation, loading / a process that extracts information from internal and external databases, transforms info using a common set of enterprise definitions, and loads the informatino to a data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dimensions

A

the who, what, where, when and how criteria of a query [ex: store 123 product abc promo 123]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

facts

A

the sales number in each cell at the intersection of dimension values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

multidimensional analysis

A

a pivot table is an example of multidim analysis, the columns fields, rows fields, and page fields are dimensions. the data in the center is a fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

info security

A

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization [ex: 38% of security incidents originate within the org]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

phishing

A

a technique to gain personal information for the purpose of identity theft or bank information

25
Q

social engineering

A

using social skills to trick people into revealing info

26
Q

token

A

small electronic device that changes user passwords automatically

27
Q

smart card

A

a device size of credit card containing embedded technologies that can store info and small amounts of software to perform some limited processing

28
Q

biometrics

A

narrowly definied/ the identification of a user based on physical characteristics such as fingerprints, iris, face, voice, or handwriting. can be costly and intrusive.

29
Q

pharming

A

re-routes requests for legitimate websites to false websites

30
Q

authentication

A

a method for confirming users’ identities / once a system determines the authentication of a user it can then determine the access priveliges, or authorization for that user

31
Q

authorization

A

the process of providing a user with permission including access levesl and abilites such as file acces, hours of access, and amount of allocated storage space

32
Q

firewall

A

a hardware and or software that guards a private network by analyzing incoming and outgoing information for the correct markings

33
Q

content filtering

A

occurs when orgs use software that filters content such as emails to prevent the accidental or malicious transmission of unauthorized information

34
Q

what are technologies available to help prevent and build resistance to attacks?

A

content filtering, encryption, and firewalls

35
Q

public key encryption (PKE)

A

uses two keys: a public key that everyone can have and a private key for only the recipient. the org provides the pubic key to all customers whether end consumers or other businesses. when it arrives at its destination the org uses the private key to unscramble it.

36
Q

DDoS/DoS attack

A

denial of service attack: floods a website with so many request for service that it slows down or crashes the site // distributed denial of service attack: attacks from multple computers flooding websites with requests

37
Q

black hat hacker

A

breaks into other peoples computers

38
Q

white hat hacker

A

work at the request of system owners to find system vulnerabilities and plug the holes

39
Q

worm

A

spreads itself not only file to file but also computer to computer. the difference between virus and worm: virus must attach to something. worms do not need to attach to anything to spread and can tunnel themselves into computers. they also replicate themselves.

40
Q

script kiddies/bunnies

A

find hacking code on the internet and click and point their way into systems causing damage or spreading viruses

41
Q

porter’s 3 generic strategies

A
  1. broad cost leadership 2. broad differentiation 3. focus strategy [ex: mercedes benz would find itself facing the dilemna of attempting to market and sell a highly specialized and expensive product at a discounted price] competitive scope and cost strategy
42
Q

porter’s 5 forces

A
  1. threat of substitute products or services 2. buyer power 3. rivalry amongst existing competitors 4. threat of new entrance 5. supplier power [rivalry amongst existing compettitors in the center]
43
Q

value chain analysis

A

views a firm as a series of business procsses that each add value to the product or serivice

44
Q

environmental scanning

A

organiztions watch their competition through enviro scanning

45
Q

business process

A

a standardized set of activities that accomplish a specific task such as processing a customer’s order

46
Q

organizational strategy

A

a leadership plan that achieves a specific set of goals or objectives, such as developing new products/services, entering new markets, increasing customer loyalty, attracting new customers, and increasing sales

47
Q

first mover advantage

A

occurs when an org can significantly impact its market share by being first to market with a competitive advantage

48
Q

IT strategy

A

organizational strategy, articulates how the company will make/sustain profits in face of competition. IT strategy developed by senior IT mangers articulates how IT will contribute to the realization of organizational strategy.

49
Q

buyer power

A

the ability of buyers as a group to directly impact the price they are wiling to pay for an item. measured by # customers, size of orders, sensitivity to price

50
Q

switching costs

A

costs that can make customers reluctant to switch to another product or service, i.e. loyalty programs

51
Q

supplier power

A

the supplier’s ability to influence the prices they charge for supplies

52
Q

supply chain

A

consists of all parties involved in the procurement of a product or raw material

53
Q

threat of substitute

A

high when there are many alternatives to aproduct or service and low when there are few

54
Q

how to properly identify a primary key and a foreign key

A

a primary key gets underlined; a foreign key gets dotted underlined

55
Q

referential integrity

A

states that every non-null foreign key value must match an existing primary key value. this ensures the consistency of the cross references among tables.

56
Q

redundancy

A

the duplication of information or storing same info in multiple places; can result in inconsistencies

57
Q

what does a table, row, and column represent

A

table: data sheet.
row: contains all data for a single record
column: a specific data value called a field; all records have the same fields

58
Q

aggregate functions

A

(total functions) sum, minimum, maximum, average, count, variance, standard deviations. aggregate functions operate on a group of rows with a common criterion.