MIT 310 test 3 TCNJ Wallace – Flashcards

Unlock all answers in this set

Unlock answers
question
3 phase DM process
answer
Intelligence phase - collect facts, beliefs, and ideas Design phase - design the method for considering the collected data, to reduce the alternatives to a manageable number Choice phase - select an alternative from the remaining choices
question
model
answer
an abstraction of reality presentation, map, equation are created using tools, e.g., data flow diagrams and Unified Modeling Language (UML)
question
Structured problem
answer
an optimal solution can be reached with one set of steps
question
Algorithm
answer
a sequence of steps to complete a task
question
Parameters
answer
categories of data that are considered in an algorithm
question
Unstructured problem
answer
no algorithm that leads to an optimal solution
question
Semistructured problem
answer
neither fully structured nor totally unstructured
question
Decision support system (DSS)
answer
a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem
question
Data management module
answer
database or data warehouse that provides data for the intelligence phase
question
Model management module
answer
turns data into useful information
question
linear regression model
answer
general statistical model best-fit linear relationship between two variables
question
Dialog module
answer
part of a DSS that allows user interaction with the program
question
Sensitivity analysis
answer
conducted to test the degree to which the total profit grows or shrinks
question
what-if analysis
answer
tests multiple parameters simultaneously
question
Tax planning
answer
DSS tax helper applications such as TurboTax and TaxCut
question
Web site planning and adjustment
answer
DSS to analyze shopper behavior, and to design Web sites based on page usage
question
Yield management (revenue management)
answer
to maximize revenue from airline trips or lodging
question
Financial services
answer
determine loan amounts, and to qualify customers based on credit history
question
Benefits selection
answer
allow employees to make decisions about their benefits
question
Expert system (ES)
answer
emulates the knowledge of a human expert Solves problems Makes decisions in a relatively narrow domain uses AI
question
Domain
answer
a specific area of knowledge
question
Neural network
answer
a program that emulates how the human brain works
question
artificial intelligence (AI)
answer
focuses on methods and technologies that emulate how humans learn and solve problems
question
Knowledge base
answer
used by an ES Collection of facts, uses inference, if-then model
question
Inference engine
answer
software that combines data input by the user with the data relationships
question
Neural networks
answer
mimic the way a human brain learns
question
Intelligent agent
answer
software that is dormant until it detects a certain event, and then performs a prescribed action
question
Case-based reasoning
answer
methodology of solving a new problem established on the solutions of similar problems
question
Group decision support system (GDSS)
answer
Allow participants to define a problem, contribute ideas, then vote on the decision group intelligence system, collaborative system, or group system
question
Geographic Information Systems (GISs)
answer
aid for map-related decisions
question
Data warehouse
answer
a large database containing historical transactions and other data
question
Business intelligence (BI)
answer
information gleaned with information analysis tools aka business analytics
question
Data mining
answer
the process of selecting, exploring, and modeling large amounts of data
question
Objectives of data mining
answer
Sequence or path analysis - finding patterns where one event leads to another Classification - finding whether certain facts fall into predefined groups Clustering - finding groups of related facts not previously known Forecasting - discovering patterns that can lead to reasonable predictions
question
Banking
answer
help find profitable customers, detect patterns of fraud, and predict bankruptcies
question
Mobile phone services vendors
answer
help determine factors that affect customer loyalty
question
UPS' Customer Intelligence Group
answer
analyze and predict consumer behavior
question
Online analytical processing (OLAP)
answer
a type of application used to exploit data warehouses composes tables "on the fly" based on the desired relationships use relational or dimensional databases designed faster than relational applications
question
Drilling down
answer
the process of starting with broad information and then retrieving more specific information as numbers or percentages moving from a broad view to a specific view of information
question
Dimensional database
answer
data is organized into tables showing information summaries aka multidimensional databases
question
Clickstream software
answer
tracks and stores data about every visit to a website
question
Dashboard
answer
an interface between BI tools and the user
question
Key performance indicators (KPIs)
answer
a business' strategic initiatives evaluated to determine the costs, savings, and benefits to be derived from their implementation
question
Knowledge management (KM)
answer
knowing where to find information about the subject gathering, organizing, sharing, analyzing, and disseminating knowledge to improve an organization's performance
question
Knowledge workers
answer
research, prepare, and provide information
question
Employee knowledge network
answer
a tool that facilitates knowledge sharing through intranets can capture information and distribute information not captured in an information system
question
Factiva
answer
a software tool that gathers online information from over 10,000 sources
question
Autocategorization
answer
automates classification of data into categories for future retrieval aka automatic taxonomy
question
Mission statement
answer
communicates the most important overarching goal of organization
question
IT mission statement
answer
describes the role of IT in the organization
question
Prototyping
answer
fast development of an application based on initial user requirements
question
Approaches to systems development
answer
Systems development life cycle (SDLC), the traditional approach Nontraditional methods, including agile methods
question
Systems analysis
answer
is to determine what needs the system will satisfy : a five-step process Investigation Technical feasibility study Economic feasibility study Operational feasibility study Requirements definition
question
Feasibility studies
answer
a larger analysis conducted to determine if a proposed system is possible and desirable
question
Cost/benefit analysis
answer
spreadsheet showing all costs and benefits of the proposed system
question
Return on investment (ROI)
answer
difference between the stream of benefits and the stream of costs over the life of the system
question
Total cost of ownership (TCO)
answer
a financial estimate for business leaders to objectively and accurately evaluate the direct and indirect costs of a new organizational project
question
Organizational culture
answer
general tone of the corporate environment
question
System requirements
answer
detail the functions and features expected from the new system detail the features needed
question
Systems design
answer
includes three steps for devising the means to meet all the requirements
question
Construction
answer
actual changes in program code
question
Data flow diagram (DFD)
answer
describes the flow of data in a business operation using four symbols External entities: individuals and groups external to the system (customers, employees, etc.) Processes: an event or events that affect data Data store: any form of data at rest Direction of data flow: indicates how data moves
question
Unified modeling language (UML)
answer
de facto standard for visualizing, specifying, and documenting software ULM consists of diagrams: Use case: an activity of the system in response to the user (an actor) Class: describes class structure and contents Interaction: describes interactions of objects and the sequence of their activities State charts: indicate the states through which objects pass and their responses to stimuli Activity: represents highly active states triggered by completion of other actions Physical diagrams: high-level descriptions of software modules
question
Implementation
answer
delivery of a new system Conversion Training
question
Conversion
answer
switching from the old system to the new system very difficult time
question
Parallel conversion Conversion strategy
answer
the old system is used simultaneously with the new system at first
question
Phased conversion Conversion strategy
answer
breaks the new IS into modules and integrates one at a time
question
Cut-over conversion Conversion strategy
answer
immediately replaces all modules Risky but may be inexpensive aka flash cut conversion
question
Pilot conversion Conversion strategy
answer
introduces the IS into one business unit at a time
question
Beta site
answer
a site that tests the new system
question
Application systems support
answer
two responsibilities Maintenance: post-implementation debugging, updates, and adding postponed features User help
question
Agile methods
answer
popular alternative to traditional systems development life cycle use iterative programming
question
Outsourcing
answer
the formal business relationship to transfer internal business processes and functions to a third-party business
question
Systems integration
answer
Examines the needs of entire organization Produces a plan to combine disparate systems to allow data to flow between units may be more complicated than systems development
question
support
answer
maintenance and satisfying changing needs
question
Custom-designed (tailored) software
answer
software developed specifically for the needs of an organization high cost
question
Offshoring
answer
outsourcing to other countries such as Costa Rica, Indonesia, Columbia, etc.
question
Business process outsourcing
answer
outsourcing routine processes, such as order entry or HR
question
Service-level agreement
answer
The most important element of an outsourcing agreement Lists all services expected of the vendor
question
scope of services
answer
single most important facet of executing a project or contract
question
Beta version
answer
a prerelease version of software to be tested by companies who want to use it
question
Request for information (RFI)
answer
request for informal information about a vendor's product
question
Request for proposal (RFP)
answer
a document that specifies all requirements and solicits a proposal
question
Application service provider (ASP)
answer
an organization that offers software through a network (the Internet or private network)
question
Software as a service (SaaS)
answer
applications available through a network
question
Caveat Emptor
answer
Buyer Beware
question
Uptime
answer
proportion of time that the ASP's systems and communications links are up
question
Storage service provider (SSP)
answer
rents storage space for remote storage of client files
question
User application development
answer
nonprogrammer users write their own business applications Shortened lead times Efficient utilization of resources
question
CIA triad
answer
foundational concepts of information systems security Confidentiality Integrity Availability
question
Downtime
answer
the period of time during which an IS is not available The #1 cause of system downtime is hardware failure
question
Blackout
answer
total loss of electricity
question
Brownout
answer
partial loss of electricity
question
Uninterruptible power supply (UPS)
answer
backup power for a short time
question
Keystroke logging (keylogging)
answer
software records individual keystrokes
question
Social engineering
answer
con artists pretend to be service people, and ask for passwords
question
Identity theft
answer
pretending to be another person
question
Phishing
answer
bogus messages direct users to a site to "update" personal data
question
Spear phishing
answer
personal information sued to attack organizational systems, particularly financial institutions
question
Cyber terrorism
answer
terrorist attacks on business organizations' information systems
question
Hacking
answer
unauthorized access
question
Honeytoken
answer
a bogus record in a networked database used to combat hackers
question
Honeypot
answer
a server containing a mirrored copy of a database or a bogus database Educates security officers about vulnerable points
question
Virus
answer
spreads from computer to computer
question
Worm
answer
spreads in a network without human intervention
question
Antivirus software
answer
protects against viruses
question
Trojan horse
answer
a virus disguised as legitimate software
question
Logic bomb
answer
software that is programmed to cause damage at a specific time
question
Denial of service (DoS)
answer
an attacker launches a large number of information requests Slows down legitimate traffic to site
question
Distributed denial of service (DDoS)
answer
an attacker launches a DoS attack from multiple computers Usually launched from hijacked personal computers called "zombies"
question
Hijacking
answer
using some or all of a computer's resources without the consent of its owner Done by installing a software bot on the computer
question
bot
answer
installs e-mail forwarding software
question
Controls
answer
constraints and restrictions imposed on a user or a system
question
Backup
answer
periodic duplication of all data
question
Redundant Arrays of Independent Disks (RAID)
answer
set of disks programmed to replicate stored data
question
Access controls
answer
measures taken to ensure only authorized users have access to a computer, network, application, or data Physical locks: secure the equipment in a facility Software locks: determine who is authorized What you know: access codes, such as user ID and password What you have: requires special devices Who you are: unique physical characteristics
question
Atomic transaction
answer
a set of indivisible transactions all of the transactions in the set to be completely executed, or none are executed
question
Audit trail
answer
a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval
question
Information systems auditor
answer
a person whose job is to find and investigate fraudulent cases
question
Firewall
answer
hardware and software that blocks access to computing resources
question
DMZ demilitarized zone approach
answer
One end of the network is connected via proxy server to the trusted network, and the other end to the Internet
question
Proxy server
answer
"represents" another server for all information requests from resources inside the trusted network
question
Authentication
answer
the process of ensuring that you are who you say you are
question
Encryption
answer
coding a message into an unreadable form
question
Plaintext
answer
the original message
question
Ciphertext
answer
the encoded message
question
Key
answer
a unique combination of bits that will decipher the ciphertext
question
Public-key encryption
answer
uses two keys, one public and one private
question
Symmetric encryption
answer
when the sender and the recipient use the same key
question
Asymmetric encryption
answer
both a public and a private key are used
question
Transport Layer Security (TLS)
answer
a protocol for transactions on the Web that uses a combination of public key and symmetric key encryption
question
HTTPS
answer
the secure version of HTTP
question
Digital signature
answer
a means to authenticate online messages; implemented with public keys
question
Message digest
answer
unique fingerprint of file
question
Digital certificates
answer
computer files that associate one's identity with one's public key contains its holder's name, a serial number, its expiration dates, and a copy of holder's public key
question
Certificate authority (CA)
answer
a trusted third party
question
Single sign-on (SSO)
answer
a user must enter his or her name/password only once
question
Business recovery plan
answer
a detailed plan about what should be done and by whom if critical systems go down
question
Mission-critical applications
answer
those without which the business cannot conduct operations
question
Hot sites
answer
alternative sites that a business can use when a disaster occurs
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New