WGU C724 (Information Systems Management) 2024

Page 1

WGU C724 (Information Systems Management) Executive information system - ✔A system that facilitates and supports senior managerial decisions. Data - ✔Unorganized data that lacks meaning. Information - ✔Data that has been organized in a meaningful manner. Information system - ✔An integrated network of components working together to convert data into useful information; includes an input, a process, and an output; comprised of people, processes, machines, and information technology. Knowledge - ✔The practical application of information. Data, Information, and Knowledge example - ✔Data: The number of people below the poverty line in the region is 50,000. Information: The number of people below the poverty line increases between 2010 and 2018. Knowledge: The number of people below the poverty line has increased due to stagnating wages and cuts to social programs. Decision support system - ✔This system uses models and statistical analysis to help decision makers solve problems Management information system (MIS) - ✔Provides timely and accurate information that enables managers to manage their departments more efficiently; analyzes performance. Transaction processing system - ✔information system used for processing patient admissions, employee time cards, and purchase orders Information management - ✔The management of organizational processes and systems; helps the organization reduce costs and adds value to products; helps the organization make better managerial decisions; stores and processes data. Information technology - ✔The use of computer and telecommunications systems for storing, retrieving, and sending information; comprised of hardware, software, data, and networks.


information technology management - ✔the management of hardware, software, data, networks, and people that facilitate access to information and allow the organization to achieve business objectives. Strategic information system - ✔provide tools used by an organization to accomplish specific tasks to gain competitive advantage. Social Networking and interpersonal skills. - ✔Enhances interpersonal and relationshipforming skills. Porters 5 competitive forces - ✔Intensity competitive rivalry bargaining power of customers bargaining power of suppliers threat of new entrants threat of substitutes Network economics (network-based strategy) - ✔the cost of adding another business participant to a business venture is small, the potential gain is great. Business ecosystems - ✔Network of businesses involved in delivering a product through mutual cooperation. Product differentiation (business strategy) - ✔offering a higher quality product to differentiate from others in the market growth (business strategy) - ✔adding new products or new enhancements to existing products Enterprise Resource Planning (ERP) - ✔Involves utilizing computer technology to link various aspects of a business; a very complex resource planning system that spans the entire business; companies often have difficulty implementing the system. Customer Relationship Management (CRM) - ✔Allows for personalized communication to customers. Knowledge Management (KM) - ✔These systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals. chief executive officer (CEO) - ✔also called president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund.


chief operations officer (COO) - ✔is the director of operations, responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas chief financial officer (CFO) - ✔manages the company's cash flow and evaluates and communicates financial risks. chief information officer (CIO) - ✔a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects; responsible for information systems strategic thinking and planning. chief technology officer (CTO) - ✔has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. chief security officer (CSO) - ✔is the highest level executive concerned with the overall security functions and policies of a business. Systems Analyst - ✔A change agent who uses design and analysis techniques to solve organizational problems using information technology; they report about system development and keep others informed; should understand overall business processes; focuses on analysis, design, and implementation Information Security Analyst - ✔Their goal is to ensure that data and systems are secure to prevent breaches. Information Security - ✔The concept of protecting valuable information assets. Project Manager - ✔They deliver quality systems on time, manage the budget, and plan for the unexpected (they do not train new users). Gantt chart - ✔A visual view of tasks scheduled over time; used for planning projects. Dashboard - ✔A system that is the culmination of information from many data sources, allowing management to perform a thorough analysis. Cultural Particularism - ✔A societal norm that emotionally ties people to local brands or habits. Network Engineer - ✔Responsible for the layout, installation, and maintenance of all information technology network components.


Success of strategic information systems projects - ✔A majority fail to meet schedule or budget Organizational features that can change the company direction - ✔Processes, politics, culture, and environment Global Business Strategies that form their organizational and information systems structure - ✔transnational, multinational, franchisers, domestic exporter Transnational - ✔a commercial enterprise that operates substantial facilities, does business in more than one country and does not consider any particular country its national home. Multinational - ✔an organization that owns or controls production of goods or services in one or more countries other than their home country. Database Management System (DBMS) - ✔Allows multiple departments to access, analyze, and modify data that is stored in one central location. Total Cost of Ownership (TCO) - ✔Helps establish feasibility. Platform as a Service (PaaS) - ✔service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services. Infrastructure as a Service (IaaS) - ✔A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Analytics as a Service (AaaS) - ✔A cloud software service Software as a Service (SaaS) - ✔Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser. Agile software development methodology - ✔an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software. Information Technology Infrastructure Library (ITIL) - ✔common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change


Pseudocode - ✔an informal high-level description of the operating principle of a computer program or other algorithm. Used for human reading, rather than machine reading, and it can be used to translate into any programming language. Input - ✔components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners. Central Processing Unit (CPU) - ✔the brain/microprocessor of the computer. Output - ✔Components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output). system bus - ✔connection between the CPU, memory, storage, expansion slots, and other motherboard components primary storage - ✔flash memory chips, such as shown below, plugged into memory slots on the motherboard. Secondary storage - ✔accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies Removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives Tertiary storage - ✔consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. First and second-generation computer languages - ✔were specific to the computer manufacturer (1GL) or to a specific processor or environment (2GL). Third generation computer languages (3GLs) - ✔high-level programming languages such as FORTRAN, COBOL, C, Java, C++, and C# Java - ✔An open-standard software language used for client-server internal applications. COBOL - ✔The first computer language; developed in the 1950s; still used today. Fourth generation computer languages (4GL) - ✔software tools that help reduce the amount of procedural knowledge that is needed about how computers operate and lets end users create programs as needed; SQL is a 4GL.


Structured Query Language (SQL) - ✔A computing language that is used with relational databases. Dynamic Random-Access Memory (DRAM) - ✔The main memory of a computer system; requires constant refreshing. Static Random-Access Memory (SRAM) - ✔Retains memory for as long as power is being supplied; does not need to be constantly refreshed; used to access the most frequently used data, as it is faster. Horizontal Application - ✔Software that provides solutions based upon the common needs of many businesses. Vertical Application - ✔Software that designed for a specific business. Software - ✔Provides instructions to computers to perform tasks. Low-Level Programming Language - ✔Basic programming languages that used machine language instruction; they are specific to the hardware and lack portability. Dumb Terminal/Thin Client - ✔A terminal that depends on the host computer for its processing power optical character recognition (OCR) - ✔Reads machine printed text; used for time cards. Intelligent Character Recognition (ICR) - ✔Reads handwritten text; more advanced form of optical character recognition (OCR). UNIX - ✔An operating system designed to code computer instructions in a mainframe environment. Workstation - ✔A powerful computer system that can handle intensive mathematical operations; often used by engineers. Mashup - ✔Occurs when software is mixed and matched to develop a customized application Field - ✔An attribute of an entity, such as name, address, or student ID. Tuple/Record - ✔A record of data set in a row. Query Language - ✔Provides instructions and procedures to retrieve data from a database.


Primary Key - ✔A field that uniquely identifies a record, such as customer ID or student ID. Foreign Key - ✔Field that is a primary key to another table. Schema - ✔The complete description of the database. Variable - ✔a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data; can become incompatible with data warehouse design. Flat File Database - ✔Stores data in plain text, holding one record; cannot contain multiple tables like a relational database. Online Analytical processing (OLAP) - ✔analyze transaction data used for making decisions; multidimensional (cubical) data; requires a lengthy, complex loading and updating phase. Online transaction processing (OLTP) - ✔database design used for browsing and manipulating business transaction activity. Processing of information into the database. Don't perform analyses on these databases because it could affect performance. relational database - ✔type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes Object-Oriented Database - ✔A database that is designed to store mixed media, as opposed to tables in relational databases. Conceptual Data Model - ✔a map of concepts and their relationships used for databases. Logical Data Model - ✔Provides foundation for designing a database Physical Data Model - ✔a representation of a data design as implemented, or intended to be implemented, in a database management system Pointers - ✔Used to show the relationship between data fields and tables.


Referential Integrity - ✔Table relationships must always be consistent; for an entity or object to exist in a table, an equal value must exist in the referenced table; the primary and foreign keys must be equal. Types of relationships in a relational database model - ✔One-to-One, One-to-Many, and Many-to-Many Data Manipulation Language - ✔A language that allows users to easily modify the data in a database. Data Warehousing - ✔a system used for reporting and data analysis, and is considered a core component of business intelligence; data is stored in one place. data mart - ✔smaller subset database from a data warehouse typically focused on a single area or function. Extraction, transformation, and loading (ETL) - ✔a process in which data is extracted from a computer, transformed (or cleansed) into a format appropriate for the data warehouse, and then transferred to the data warehouse. Direct Move - ✔Data that does not need to be transformed being transferred to a data warehouse. Data mining - ✔process of identifying hidden patterns and relationships in structured databases and applying rules to that data in order to predict future behavior. Web Mining - ✔process of identifying hidden patterns and relationships in nonstructured databases, such as the Internet, and applying rules to that data in order to predict future behavior. Text mining - ✔High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. Partitioning - ✔Dividing a database into more manageable segments. Master Data - ✔Objects shared across the enterprise; it is key to accurate business reporting and analysis Data Governance - ✔Concerned with the management of data, including maximizing quality through effective utilization, availability, and protection. Entity-Relationship Diagram (ERD) - ✔Illustrates the relationships among all of the tables in a database.


Database Administrator - ✔Responsible for the creation and management of the entire database management system (DBMS). Data Administrator - ✔Responsible for determining and monitoring employees' access to the company's database management system (DBMS). Information Policy Administrator - ✔Responsible for acquiring, organizing, and distributing organizational information internally. Data Dictionary - ✔Stores and manages all of the information about the database, or the metadata. Three V's of Big Data - ✔Volume, Variety, and Velocity; Volume refers to the amount of data, variety refers to the number of types of data, and velocity refers to the speed of data processing (real-time analytics). Health Analytics Tools - ✔through smartphone sensors or wearable peripheral devices. Data from these devices is collected, analyzed, and used to help a user to understand, improve, and maintain, or automatically report, their health to their health professionals. Geographic Information Systems (GIS) - ✔Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations wide area network (WAN) - ✔connection b/w small networks that create a large network that typically connects business campuses consisting of computer systems across large distances Voice over Internet Protocol (VoIP) - ✔VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet. Public Switch Telephone Network (PSTN) - ✔The entire interconnected voice telephone network around the world. It is switched based. Protocols - ✔used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device. Bridge - ✔a device that connects and passes packets between two network segments that use the same communications protocol; can be used to boost Wi-Fi strength in areas of low signal quality. router - ✔used to connect multiple networks together and forward data packets between those separate networks to the destination host.


Core Router - ✔A more powerful router that is used to optimize high volume transmissions; aggregate data from business and transmit the data directly to the Internet backbone. Digital Signal - ✔a signal that is being used to represent data as a sequence of discrete values Simple Mail Transfer Protocol (SMTP) - ✔Used to manage and monitor emails that we receive. Packet Switching - ✔a mode of data transmission in which a message is broken into a number of discrete, parsed parts that are sent independently in encapsulated packets, over whatever route is optimum for each packet, and reassembled at the destination; what is used when accessing the Internet; Circuit Switching - ✔ideal for communications that require data to be transmitted in realtime; a constant connection is required before transmission begins. Repeaters - ✔Receive and retransmit/amplify data at a higher power to it can go a longer distance. Tangible User Interface - ✔An interface in which a person interacts with digital information through the physical environment Virtual Network - ✔Create peer-to-peer connections between computers. mesh network - ✔network topology in which each node relays data for the network TCP/IP - ✔most common protocol which establishes the connection, and data packet quality transmission. The first two bytes are assigned by the Internet Service Provider (ISP), and the last two bytes are assigned by the client. Open System Interconnection (OSI) - ✔consists of seven layers and is an international standard that governs or guides the development of data communication protocols the seven layers are: application, presentation, session, transport, network, data link, and physical. Telecommunications Network - ✔Enables the exchange of information between end users across nodes and links. Star network - ✔Router in middle of each computer connected to the router/hub.


ring network - ✔each computer connected to the next computer; cheaper to install; less effiecient. network host - ✔node/computer connected with an IP address Convergence - ✔the ability for a telecommunication network to carry voice, data, and video Sniffing - ✔eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network; the most common attack, as signals travel through the air Extranet - ✔an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely. ARPANET - ✔an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet. Information Repository - ✔Allows businesses to store important information and documents that can be accessed remotely by stakeholders; sometimes a fee for the service is charged. 1G Networks - ✔The first cellular mobile networks; could only transmit analog signals on radio frequency. 2G Networks - ✔Has a 64 kbps speed 3G Networks - ✔384 kbps speed 4G Networks - ✔Also called long-term evolution (LTE), these networks offer speeds of 100,000 kpbs in the Ultra High Frequency band; offers voice, data, and video. Wi-Fi Protected Access (WPA) - ✔A wireless (tunneling) encryption protocol that provides secure data transmission over an insecure network. Wi-Fi Protected Access 2 (WPA2) - ✔Provides even stronger security than the original. Radio Frequency Survey - ✔Used to determine wireless access point locations based upon signal strength. Electronic Data Interchange (EDI) - ✔An automatic electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention.


Network Address Translation (NAT) - ✔Allows private users to redefine network addresses to assign their own addresses. Spoofing - ✔The creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system; elicits a response from the network. Scalability - ✔The ability to grow Passive Tags - ✔A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader. Hertz - ✔A measurement of frequency Wireless Sensor Networks (WSNs) - ✔a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions hypervisor - ✔An expensive application used to improve network performance without having to physically change the network; runs virtual machines. IPv6 - ✔The latest IP iteration, it was developed to increase the number of unique IP addresses, as each device that connects to the Internet needs its own IP address and there were not enough to accommodate future devices. Packet Switched Data Networks (PSDN) - ✔The standard for current telecommunication networks. Quality of Service (QoS) - ✔Used to ensure voice or circuit switched communication quality. System Development Life Cycle (SDLC) - ✔Analysis Phase 1. Identify problems, root cause, opportunities, and objectives 2. Determining information requirements (most important) 3. Analyzing system needs and develop a solution Design Phase 4. Designing the recommended system 5. Developing and documenting software


Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system User Requirements Analysis - ✔Determines inputs, outputs, process steps, and data storage needs. waterfall model (SDLC) - ✔Where each stage must be completed before moving on to the next stage; slow application development; used when system requirements are clearly documented and unlikely to change. Spiral Model (SDLC) - ✔risk-driven process model generator for software projects. Based on the unique risk patterns of a given project, the spiral model guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping. Fountain Model (SDLC) - ✔Like the waterfall model, but this one allows for going back to previous steps. Build and fix model (SDLC) - ✔the simplest SDLC model allowing for code to be incrementally modified and implemented until successful. prototyping model (SDLC) - ✔requires the development of a scaled prototype that can be tested prior to full-scale development End-user development (SDLC) - ✔fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists. Agile development (SDLC) - ✔encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. (interactive) Rapid application development (RAD) - ✔software development focuses on the development's process, with limited emphasis on the planning process and uses prototypes. critical path method (CPM) - ✔step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems. Modular Design - ✔a design approach that subdivides a system into smaller parts called modules or skids, that can be independently created and then used in different systems.


data-flow model - ✔describes how data moves and is processed by the proposed system under development. system-oriented (system evaluation) - ✔which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant. function-oriented (system evaluation) - ✔determine of the success of the information system in examining he performance of data, hardware, software, networks, and human resources Strategy-Oriented (system evaluation) - ✔the determination of whether the information system outputs enable management to execute the plan. Structured decisions - ✔involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make... decisions. four phases of the decision-making process - ✔intelligence, design, choice, and implementation Decision analysis - ✔method of assisting decision makers with making simple choices and using mathematical formulas to infer from these choices whether the decision maker is making the best decision. Scope - ✔Elements of a project that include cost, time, quality, and risk. Risks - ✔the potential for loss, commonly associated with the monetary and nonmonetary impact to such a risk, as well as the probability of occurrence. Risk Management (system security) - ✔Investment in risk aversion preparedness. Vulnerabilities - ✔weakness in the technology, process, and procedure, or people involved with any given information asset Threats - ✔identified and unidentified actors that have the potential for attacking the information assets. (Internal, External) Attacks - ✔damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence


Social engineering - ✔normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo. Organizational risk factors - ✔Risks that stem from hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals Cold sites - ✔Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days. Warm sites - ✔Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days. Hot sites - ✔Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours. PERT Chart - ✔A chart that represents tasks using an activity-on-arrow diagram; not a process description tool System on a Chip (SoC) - ✔A modern microprocessor that contain the CPU, memory, and peripheral interfaces; a miniature computer; an example is the Raspberry Pi. Moore's Law - ✔Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years. copyright - ✔egal right given to the creator of an original work allowing the exclusive right for sale and distribution of that work for a period of time. patent - ✔legal right given to an inventor of a product or process Data normalization - ✔the reorganization of tables, and attributes within a database to reduce duplication is especially important during database redesign, but also when data is imported or merged. The Three Norms in Normalization - ✔1NF, 2NF, 3NF Clickstream applications - ✔Track and analyze a customer's internet activity, including how it is used and where they click.


Scrum software development methodology - ✔form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges, which cannot be addressed with the traditional waterfall SDLC model, can be quickly addressed work breakdown structure (WBS) - ✔broken down list of all deliverables showing what the customer will get at the end of a project. Unified Modeling Language (UML) - ✔A general-purpose modeling language that helps visualize systems through diagrams. change agent - ✔Helps companies transform as well as lead, motivate, and train users to help them adopt to change. Processed-Centered Environments - ✔These environments can specify analysis and design; very resourceful. problem solver - ✔involves converting processes and procedures into system components and troubleshooting errors or delays that may occur. Newsletter - ✔A publication that covers a specific issue. Methods for Increasing User Adoption and Reducing Costs - ✔Benchmarking, usability testing, user communication, internal user groups, planning, and leveraging existing resources; six in total. Qualitative Risk Analysis - ✔Looking at conditions that can affect the project; looks at the consequences of risk and estimates the impact of those risks on the organization. Upper CASE Tools - ✔Support software modeling and analysis Lower CASE Tools - ✔Support development activities, such as design, testing, debugging, and maintenance. Workbench - ✔a unified CASE visual tool for database architects, developers, and database administrators. Microsoft Visual Basic is an example. Environments - ✔A CASE software that combines tools and workbenches to support the entire system development life cycle (SDLC); the most common CASE tool. Developing Internet Search Strategy - ✔Review information requirements, use proper search techniques, evaluate results, and determine copyright fees and the accuracy of data.


Web 2.0 - ✔Websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users; enables collaboration and interaction among users. Structured English - ✔the use of the English language with the syntax of structured programming to communicate the design of a computer program to non-technical users by breaking it down into logical steps using straightforward English words; uses modular design and data terminology. System-Level Security - ✔Consists of the architecture (layers), policy, and process levels. Classical Management Model - ✔A management practice that focuses on productivity; focuses on more systematic and predictable issues. Behavioral Management Model - ✔A management practice that focuses on the employees' human needs; focuses on less systematic and predictable issues. Mintzberg's Ten Manager Roles - ✔Figurehead, leader, Liaison, Monitor, Disseminator, Spokesman, Entrepreneur, Disturbance Handler, Resource Allocator, and Negotiator. Analytics Services - ✔Creates analytical databases. Balanced Scorecard - ✔A performance metric used in strategic management to identify and improve various internal functions of a business and their resulting external outcomes; focused on strategy and not implementation; tracks and monitors staff and organizational activities. Decision Support System (DSS) - ✔an information system that supports business or organizational decision-making activities. Group Decision Support System (GDSS) - ✔n interactive computer based system that facilitates a number of decision-makers (working together in a group) in finding solutions to problems that are unstructured in nature; enables remote collaboration. Executive Support Systems (ESS) - ✔Helps executives make unstructured and semistructured decisions; includes internal and external data. Executive - ✔ Business Performance Management (BPM) - ✔Uses business intelligence analytics and process change to enable organizational performance; includes goal selection, attainment measurement, and achievement intervention.


Decision Tree Analysis Tool - ✔Presents a visual flowchart representation of the decision and outcomes, but it does not include roots in the model. Elements of Analytics - ✔Includes data mining, process mining, business process modeling, complex event processing, predictive analysis, and prescriptive analysis. Prescriptive Analytics - ✔the area of business analytics (BA) dedicated to finding the best course of action for a given situation. Elements of Decision Theory - ✔Acts, events, outcomes, and payoffs. Classifications of Cloud Computing - ✔Public, Private, and Hybrid Business Intelligence - ✔Consists of databases, data warehouses, and analytics; helps business gain a competitive advantage; common functionalities include measurements, analytics, reporting, collaboration, and knowledge management; provides real-time, relevant, and user-customized information that is easily shared. Data Integration Service - ✔A depository of extracted business environment data. Prototyping Software Development Method - ✔User basic requirements, development of prototype, using prototype, and revising prototype Microsoft Visio - ✔Helps systems analysts create professional diagrams that simplify complex information. Information Systems Managers - ✔They make decisions. Rich Site Summary (RSS) - ✔a type of web feed which allows users to access updates to online content in a standardized, computer-readable format. Predictive Analytics - ✔A business intelligence method or algorithm that uses statistics and data mining to forecast models. Government Regulations on Security - ✔Enact and enforce security; manage and retain documentation. Types of Information Systems Controls - ✔General and Application Principle of Least Privilege - ✔Limits access to only authorized users based upon job requirements.


Separation of Duties - ✔Ensures that personnel's responsibilities and duties are separated from their access. Disaster Recovery Plan (DRP) - ✔Helps a business resume quickly and effectively after a disaster. Virtual Credit Card - ✔Requires the use two-factor authentication from a bank before permitting the transaction. Fair Information Practices (FIP) - ✔Principles that govern the collection and use of information about individuals. Digital Millennium Copyright Act (DMCA) - ✔A United States copyright law created to prosecute the production and dissemination of technology, devices, or services that control access to copyrighted works. Gramm-Leach-Bliley Act of 1999 - ✔Enacted procedures to store or transfer financial information; also known as the Financial Services Modernization Act Pharming - ✔Used to steal personal information by redirecting users to official-looking websites. Phishing - ✔Used to steal personal information by sending the user an official-looking email. Sarbanes-Oxley Act of 2002 (SOX) - ✔Requires organizations to adhere to rules to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements. Evil Twin - ✔a fraudulent Wi-Fi access point that appears to be legitimate Data in Use - ✔Data that is in the process of being created, updated, destroyed, or changed. Data in Motion - ✔Data is in the RAM. Data at rest. - ✔Data that is stored. General Data Protection Regulation (GDPR) - ✔Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage. E-Commerce - ✔transactions conducted electronically on the Internet.


Omnichannel Model - ✔Where physical retail storefronts now become hybrid warehouses, whereby allowing for the reduction of inventory, leaner operations, and faster reactions to change in demand. Malware - ✔Software that is intended to damage a computer or computer system. Freemium - ✔a pricing strategy by which a product or service (typically a digital offering or an application such as software, media, games or web services) is provided free of charge, but money (premium) is charged for additional features, services, or virtual goods. e-Tailer - ✔a retailer selling goods via electronic transactions on the Internet. Private Industrial Network - ✔A single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations. Web Sales - ✔A business strategy that relies heavily on efficient and secure software implementation. Mainframe Computer - ✔A powerful computer that can perform quick processing. Development methodologies that allow for the reuse of objects - ✔Component-based development and object-oriented development Post Office Protocol (POP) - ✔A telecommunication protocol that is used to retrieve email from a mail server. Media Access Control (MAC) - ✔given to a network adapter when it is manufactured. It is hardwired or hard-coded onto your computer's network interface card (NIC) and is unique to it; an access point can be configured to allow only this specific address.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.