WGU DAC1 Information Systems Management – Flashcards

Unlock all answers in this set

Unlock answers
question
Satisficing
answer
a Decision making model, make a choice that is satisfactory, even if it is not the best; works for unseen issues where a decision needs to be made quickly
question
Association or dependency modeling
answer
market basket analysis
question
Clustering
answer
discovering how groups of people are similar
question
Classification
answer
aka prediction, evaluate historical data to make current predictions
question
Regression
answer
find a causal replationship between sets of data
question
Summarization
answer
sums, averages, other stats
question
Predictive Analysis
answer
uses infor and business analysis to build a predictive model for a given application
question
Text analytics
answer
process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)
question
software agent
answer
small piece of software that acts on your behalf
question
Autonomous agent
answer
can adapt and alter the manner in which it attempts to achieve its assigned task
question
Distributed agent
answer
works on multiple distinct computer systems
question
Mobile agent
answer
can relocate itself onto different computer systems
question
Intelligent agents
answer
incorporates AI capabilities like learning and reasoning
question
Biomimicry
answer
Learn how people based systems behave, predict how they will behave, improve human systems to make them more efficient and effective
question
Swarm intelligence
answer
Collective behavior of groups of simple agents
question
Operational feasibility
answer
does a decision fit the needs and mission of the organization
question
economic feasibility
answer
Does a decision fit with the budget
question
Technical feasibility
answer
Does it fit within employee skills, what about system maintenance
question
Human factors feasiliby
answer
Is the decision accepted by staff
question
Legal and political feasibility
answer
does it comply with laws?
question
Systems design
answer
Once logical model is finished, translate into appropriate information technologies
question
UI design
answer
User interface, keep end user in mind, get feedback from users to create clear, intuitive controls
question
Data design
answer
User doesn't see it, analyst identifies the underlying structures of the system
question
Process design
answer
Flow of application logic is determined; can't be overly complicated
question
Prototyping
answer
Sample of final design, users try it and give feedback
question
End-user development
answer
let users themselves create what they need; IT support is crucial!
question
ERP Requirements
answer
modular, contralized database, integrated functions, flexible best practices, real time functions, internet enabled
question
Web 2.0
answer
2nd generation of web focusing on online collaboration, users as both crators and modifiers of content
question
static information
answer
early web; users started internet, went to a website, found what they wanted
question
Pushed static info
answer
Websites provided static info (SPAM)
question
Pulled dynamic info
answer
Late 1990, search for real time info, like stocks, travel sites; birth of e-commerce
question
Push dynamic info
answer
today's web; tailored to individual needs; RSS, personalized recommendations (shopping carts, etc.)
question
Massive Multi Player Online Role Playing Games
answer
ex world of warcraft
question
Data resource management
answer
database structures and how info is linked through primary keys
question
hierarchical database
answer
Tree style with root nodes and child nodes; not easy to query
question
Network database
answer
more flexible than hierarchical, data defined in sets, must define ALL potential relationships ahead of time
question
Object oriented database
answer
abstract related pieces of information into units; can easily be extended, promotes reuse of existing database architecture
question
Relational database
answer
most common; data presented as a series of values in 2-dimensions called tables; can create several relationships
question
Operational database
answer
necessary for operation of business; ex HR personnel
question
Distributed database
answer
stores info across many systems; fault toleratnt because data is stored in several places
question
External database
answer
exists outside your direct control; fee based; ex marketing database
question
Hypermedia database
answer
media based database; ex youtube
question
Keys
answer
ways to access data, such as last name or phone number
question
Primary key
answer
uniquely identifies only one key, ex employee id
question
Multi table relationships
answer
use different tables to keep track of various features of the same person
question
Query
answer
process of requresting info out of a database
question
Redundance
answer
goal is to remove this, making it easier to keep a database organized
question
Normalization
answer
process of removing redundancy and ensuring consistency
question
Database management system
answer
create databases, manage users, general maintenance, makes it user friendly
question
structured query language
answer
uses relational databases to look for info
question
Information systems
answer
Combination of implementing data storage, processing, and communicating hardware
question
Information technology
answer
Entire process of collecting, storing, processing, securing, disseminating information, not just computers
question
Management Information systems
answer
Use to manage business processes in a business/department for decision making, managing data, people, and projects
question
Porter's Five Forces
answer
existing competition, threat of new entrants, power of buyers, power of suppliers, threat of substitution
question
Cost leadership
answer
lower price for same or better quality than competitors
question
Differentiation
answer
Offer a product that is new and different
question
Focus
answer
target a specific customer segment with a certain type of product
question
Systems Analysis
answer
Figures out how hardware, software, network, people, data, and information work together
question
Strategic management
answer
focuses on overall direction and guidance
question
Tactical management
answer
develops goals and strategies
question
Operational management
answer
day to day operations
question
Non-management
answer
perform daily tasks
question
coarse granualrity
answer
info based on summaries of time periods; used by strategic management
question
Topline competitive advantage
answer
focus on increasing revenue
question
Synergy
answer
Where people, information, and technology come together
question
Business Intelligence
answer
Collective info about customers, competitors, business partners, competitive environment, own internal operations; used to make effective strategic decisions
question
Quality
answer
Timeliness, location, form, validity
question
Upward information flow
answer
Moves from the actual information up to upper management. Ex, selling a product, flows to different departments
question
Fine granularity
answer
Info based on specific details
question
Downward information flow
answer
Directives from upper management
question
Horizontal information flow
answer
Between departments and functional work teams
question
Out/In information flow
answer
Info to and from customers, supplyers, partners; yields competitive advantage
question
Internal
answer
specific operational aspects of an organization
question
External
answer
What's going on in the enfironment surrounding the organization
question
Objective
answer
raw facts and data, can be quantified
question
subjective
answer
describes something; interpreted data
question
Break even analysis
answer
Determining at what point the financial impact of a resource becomes reasonable
question
Fixed cost
answer
expenses that never change (ie rent)
question
Variable
answer
costs that change to acquire and product the product
question
Revenue
answer
How much you sell a product for
question
Recommendation engines
answer
based on likes, dislikes, past purchases
question
Long-tail economics
answer
niche products
question
Run-Grow-Transform
answer
Cost leadership to simply exist, focus and differentiate to increase market, innovative project to find a new market
question
Competitive business strategies
answer
Cost leadership, differentiation, innovation, growth, alliance
question
Enterprise Businss Systems
answer
Custom built to meet specific needs of an organization; very expensive, work to integrate internal processes with external entitites
question
Cross functional systems
answer
Transcends different divisions to change how info is used and increase efficiency by eliminating redundancy
question
Enterprise Resource planning
answer
Connects different departments
question
Customer resource management
answer
focus on customer relationship/info about customers
question
Knowledge management
answer
centralized mechanisms for storing and querying info
question
Partner relationship management
answer
Relationship between business and channel partners
question
Supply Chain management
answer
Improve process of obtaining sourece materials, manufacturing, delivery, manages entire life cycle of a product
question
Functional business Systems
answer
Support business operations; accounging, marketing, HR, etc.
question
Human Resource management
answer
Keep track of employees, skills, PD, achievements; identify staffing needs
question
Sell-Source-Ship
answer
Alternative to distribution chain; helps reduce fixed costs due to less storage space and wasted product
question
Supply Chain management system
answer
tracks inventory and informtion among business processes
question
Just in time manufacturing
answer
method for delivering product at the exact time a customer wants; ex target having products on shelves so all a customer has to do is buy it
question
Information Partnership
answer
2 or more companies cooperate by integrating IT systems, offereing customers the best of what each can offer
question
Multi channel service delivery
answer
a company's offering multiple ways in which they interact with customers; ex email, fax, phone, web
question
Customer resource management system
answer
not just software; total business objective; hardware, servers, support, etc
question
Sales force automation systems
answer
automatically trachs steps in sales process; contact management, empower sales reps
question
Software as a service
answer
delivery model for software where a company only pays for what it uses; like Cloud; reduces fixed costs
question
Materials Requirement Planning
answer
Management knew what was needed when
question
Materials Requirement Planning II
answer
included MRP and accounging and finance
question
Decision support system
answer
Helps make decisions
question
Legacy Information Systems
answer
massive long-term business investment in a software system with a single focus; often brittle, slow
question
Intelligence
answer
diagnostic pahse - detect and interpret that something needs attention
question
Design
answer
develop as many solutions as possible
question
Choice
answer
examine options and select one
question
Implementation
answer
apply selected option, monitor results, make corrections
question
Graphin information system
answer
DSS method, displays map-based infor
question
Moden management
answer
representation of a situation, statistical models or equations
question
Data management
answer
database to organize and store info
question
User interface
answer
the way for the decision maker to interact with the system
question
structured query language
answer
Info is processed to give correct answer
question
Unstructured
answer
several indefinate answers
question
Semmi-structured
answer
some measurable elements, some not measurable
question
Quality and Types of information
answer
Time, content, form
question
Analytical modeling
answer
various scenarios are run mathematically, so decisions can be made (computers do this)
question
Sensitivity Analysis
answer
Change one variable and see how the others change
question
Goal seeking analysis
answer
makes repeated changes to variables until a chosen value is reached
question
Optimization analysis
answer
finds optimal value given certain constraints
question
Filtering
answer
hide data that don't matter
question
Conditional formatting
answer
highlights individual cells that match criteria
question
Pivot table
answer
summarizes by sorting, counting, totalling cells
question
Data mining
answer
computer searches large quantities of data for unseen patterns
question
Artificial Intelligence
answer
making systems that can imitate aspects of human resoning and motion, ex weather prediction
question
Expert systems
answer
designed to apply human like reasoning to reach a conclusion
question
Neural networks
answer
attempts to simulate human ability to classify items and recognize patterns, ex handwriting and speech recognition
question
Fuzzy logic
answer
mathematical models for forming conclusions from vague information ex spam filters
question
Genetic algorithms
answer
trian and error to develot increasingly better solutions to a problem
question
Intelligent agents
answer
ex auto fill boxes
question
Virtual reality
answer
simulation of the physical world, ex flight simulators
question
Online Analytical Processing
answer
BI info about customers; uses analytics, integratd use of technology tools and stats to create real-time high quality info
question
Data dictionary
answer
contains logical structure for the info in a database
question
Demand prediction
answer
how much of something will be needed
question
Replenishment frequency
answer
when to move products and where
question
Basic reporting
answer
everyday stuff
question
Integrity Constraints
answer
rules that help ensure the quality of the information
question
Data definition subsystem
answer
helps create and maintain data dictionary and define structure of files in a database
question
Data manipulation subsystem
answer
helps add, change, and delete info in a database and query it
question
View
answer
helps see contents, make changes, sort, query
question
Report generators
answer
quickly define formats of reports
question
Query by example tools
answer
graphically design answer to a question
question
Data generation sybsystem
answer
contains facilities to help develop transaction-intensive applications
question
Data admin subsystem
answer
manage overall data base enfironment like security, backup/recovery
question
Data mining
answer
a logical collection of information gathered from many different operational databases, used to create business intelligence
question
Open systems
answer
hardwar and software standards that make it possible for many different devices to communicate
question
website
answer
specific location
question
website address
answer
unique name to identify a specific site
question
uniform resource locater
answer
URL
question
hyper text transfer protocol
answer
http
question
Top level domain
answer
.com .net, etc.
question
Internet Corporation for Assigned Names
answer
Keeps track of internet domains
question
Web 2.0
answer
2nd generation of web focuses on online collaboration
question
Network Access Point
answer
Where severalc onnections converge on internet
question
Network Service Provider
answer
Owns Network access points
question
Communications protocol
answer
set of rules every computer follows to transfer information
question
Decision making model
answer
intelligence, design, choice, implementation
question
Association or dependency modeling
answer
market basket analysis
question
Clustering
answer
discovering how groups of people are similar
question
Classification
answer
aka prediction, evaluate historical data to make current predictions
question
Regression
answer
find a causal replationship between sets of data
question
Summarization
answer
sums, averages, other stats
question
Predictive Analysis
answer
uses infor and business analysis to build a predictive model for a given application
question
Test analytics
answer
process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)
question
software agent
answer
small piece of software that acts on your behalf
question
Autonomous agent
answer
can adapt and alter the manner in which it attempts to achieve its assigned task
question
Distributed agent
answer
works on multiple distinct computer systems
question
Mobile agent
answer
can relocate itself onto different computer systems
question
Intelligent agents
answer
incorporates AI capabilities like learning and reasoning
question
Biomimicry
answer
Learn how people based systems behave, predict how they will behave, improve human systems to make them more efficient and effective
question
Swarm intelligence
answer
Collective behavior of groups of simple agents
question
Operational feasibility
answer
does a decision fit the needs and mission of the organization
question
economic feasibility
answer
Does a decision fit with the budget
question
Technical feasibility
answer
Does it fit within employee skills, what about system maintenance
question
Human factors feasiliby
answer
Is the decision accepted by staff
question
Legal and political feasibility
answer
does it comply with laws?
question
Systems design
answer
Once logical model is finished, translate into appropriate information technologies
question
UI design
answer
User interface, keep end user in mind, get feedback from users to create clear, intuitive controls
question
Data design
answer
User doesn't see it, analyst identifies the underlying structures of the system
question
Process design
answer
Flow of application logic is determined; can't be overly complicated
question
Prototyping
answer
Sample of final design, users try it and give feedback
question
End-user development
answer
let users themselves create what they need; IT support is crucial!
question
Component development
answer
Use existing pieces of development to combine their functionality to produce new output
question
Systems development life cycle
answer
structured spproach for developing IS, Waterfall method
question
Planning
answer
Define system to be developed, scope, and plan
question
Analysis
answer
Gather business requirements, prioritize them
question
Design stage
answer
Design technical architecture (hardware, software, telecommunications equipment), design system model, draw graphical representation of a design
question
Development
answer
Build technical architecture, database and programs
question
Testing
answer
Write test conditions, and perform testing (unit, system, integration, user acceptance)
question
Implementation stage
answer
write detailed user documentation, provide training
question
Maintenance
answer
Build helpdesk support, provide environment to support changeds
question
Reliability
answer
how consistently a system performs
question
Scalibility
answer
ability of a ssytem to meet increased service demands
question
De-centralized
answer
share no systems between units, eaqch meets its own needs
question
centralized
answer
all IT services are coordinate from one source; can be inflexible
question
distributed model
answer
connect separate components at different locations or within different units
question
Interoperability
answer
ability of 2 or more vomputer components to share info and resources, even if made by different manufacturers
question
Request for proposal
answer
official request for bids from vendors
question
Metrics
answer
measures used to indicate progress or quality
question
Throughput
answer
amount of info that can pass through a system at once
question
System aviailability
answer
measure of reliability; average amount of time a system is usable
question
error rate
answer
number of mistakes a system generates per thousand or million transactions
question
Transaction speed
answer
How fast the system operates, ie response time
question
Effectiveness metrics
answer
CRM SCM Call center performance
question
Financial metrics
answer
what is the financial impact
question
access controls
answer
controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
question
adware
answer
alien software designed to help pop-up advertisements appear on your screen.
question
alien software
answer
clandestine software that is installed on your computer through duplicitous methods.
question
anti-malware systems (antivirus software)
answer
software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
question
audit
answer
an examination of information systems, their inputs, outputs, and processing.
question
authentication
answer
a process that determines the identity of the person requiring access.
question
authorization
answer
a process that determines which actions, rights, or privileges the person has, based on verified identity.
question
back door
answer
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
question
biometrics
answer
the science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.
question
blacklisting
answer
a process in which a company identifies certain types of software that are not allowed to run in the company environment.
question
certificate authority
answer
a third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
question
cold site
answer
a backup location that provides only rudimentary services and facilities.
question
communications controls (network controls)
answer
controls that deal with the movement of data across networks.
question
controls
answer
defense mechanisms (also called countermeasures).
question
cookie
answer
small amounts of information that web sites store on your computer, temporarily or more or less permanently.
question
copyright
answer
a grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
question
cybercrime
answer
illegal activities executed on the internet.
question
cyberterrorism
answer
can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
question
cyberwarfare
answer
war in which a countries' information systems could be paralyzed from a massive attack by destructive software.
question
demilitarized zone (DMZ)
answer
a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet.
question
denial-of-service attack
answer
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
question
digital certificate
answer
an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
question
distributed denial-of-service (DDoS) attack
answer
a denial-of-service attack that sends a flood of data packets form many compromised computers simultaneously.
question
employee monitoring systems
answer
systems that monitor employees' computers, e-mail activities, and internet surfing activities.
question
encryption
answer
the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
question
exposure
answer
the harm, loss, or damage that can result if a threat compromises an information resource.
question
firewall
answer
a system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the internet, and private networks, such as your company's network.
question
hot sites
answer
a fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near real-time recovery of IT operations.
question
identity theft
answer
crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
question
information security
answer
protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
question
intellectual property
answer
the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
question
least privilege
answer
a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
question
logic bombs
answer
segments of computer code embedded within an organization's existing computer programs.
question
malware
answer
malicious software such as viruses and worms.
question
network controls
answer
communications controls
question
password
answer
a private combination of characters that only the user should know.
question
patent
answer
a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.
question
phishing attack
answer
an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
question
physical controls
answer
controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
question
piracy
answer
copying a software program (other than freeware, demo software, etc.) without making payment to the owner.
question
privacy
answer
the right to be left alone and to be free of unreasonable personal intrusion.
question
privilege
answer
a collection of related computer system operations that can be performed by users of the system.
question
public-key encryption
answer
(also called asymmetric encryption) a type of encryption that uses two different keys, a public key and a private key.
question
risk
answer
the likelihood that a threat will occur.
question
risk acceptance
answer
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
question
risk analysis
answer
the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each betting compromised with the costs of protecting it.
question
risk limitation
answer
a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
question
risk management
answer
a process that identities, controls, and minimized the impact of threats, in an effort to reduce risk to manageable levels.
question
risk mitigation
answer
a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
question
risk transference
answer
a process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.
question
secure socket layer (SSL)
answer
(also known as transport layer security) an encryption standard used for secure transactions such as credit card purchases and online banking.
question
security
answer
the degree of protection against criminal activity, danger, damage, and/or loss.
question
social engineering
answer
getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
question
spam
answer
unsolicited e-mail.
question
spamware
answer
alien software that uses your computers as a launch platform for spammers.
question
spyware
answer
alien software that can record your keystrokes and/or capture your passwords.
question
threat
answer
any danger to which an information resource may be exposed
question
trade secret
answer
intellectual work, such as a business plan, that is a company secret and is not based on public information.
question
transport layer security (TLS)
answer
see secure socket layer.
question
trap doors
answer
see back doors.
question
trojan horse
answer
a software program containing a hidden function that presents a security risk.
question
tunneling
answer
a process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
question
visual private network (VPN)
answer
a private network that uses a public network (usually the internet) to securely connect users by using encryption.
question
viruses
answer
malicious software that can attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection.
question
vulnerability
answer
the possibility that an information resource will be harmed by a threat.
question
warm site
answer
a site that provides many of the same services and options of the hot site, but does not include the company's applications.
question
whitelisting
answer
a process in which a company identifies acceptable software and permits it to run, and either prevents anything else form running or lets new software run in a quarantined environment until the company can verify its validity.
question
worms
answer
destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New