final exam pt.2

what contains a subset of data warehouse information?

data mart

is a storage repository that holds a vast amount of raw data in its original format until the business needs it.

data lake

what describes the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete information. (2)

1. information cleansing
2. information scrubbing

is a business that collects personal information about consumers and sells that information to other organizations.

data broker

what is erroneous or flawed data?

dirty data

what is a technique for establishing a match, or balance, between the source data and the target data warehouse?

data map

is the collection of data from various sources for the purpose of data processing.

data aggregation

is a central location in which data is stored.

repository

what is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse?

extraction, transformation, and loading

is an individual item on a graph or a chart.

data point

what is an organized collection of data?

data set

what can compare two or more data sets to identify patterns and trends?

comparative analysis

is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks

data warehouse

data identifies the primary location where data is collected.

source data

what occurs when a company keeps tabs of its copetitors activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?

competitive monitoring

what is the solution to the problem of being data rich and information poor?

business intelligence

is an approach to business governance that values decisions that can be backed up with verifiable data.

data-driven decision management

what statement accurately defines the problems with too much information?

data rich, information poor

can compare two or more data sets to identify patterns and trends.

comparative analysis

use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making.

data mining tools

who extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information?

data scientists

a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.

cluster analysis

reveals the relationship between variable along with the nature and frequency of the relationships.

affinity grouping analysis

the process of organizing data into categories or groups for its most effective and efficient use.

classification analysis

what processes and manages algorithms across many machines in a computing environment?

distributed computing

describes technologies that allow users to "see" or visualize data to transform information into a business perspective.

data visualization

what tracks corporate metrics such as critical success factors and key performance indicators advanced capabilities such as interactive controls allowing users to manipulate data for analysis?

business intelligence dashboards

the classification or labeling of an identified pattern in the machine learning process.

pattern recognition analysis

determines a statistical relationship between variables, often for the purpose of identifying predictive factors among the variables.

correlation analysis

analyzes text flowing across the internet, including unstructured text from blogs and messages.

social media analysis

identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables.

exploratory data analysis

the process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise.

speech analysis

analyzes unstructured data associated with websites to identify consumer behavior and website navigation.

web analysis

analyzes unstructured data to find trends and patterns in words and sentences.

text analysis

is a statement about what will happen or might happen in the future.

prediction

what is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?

fast data

what is a data value that is numerically distant from most of the other data points in a set of data?

outlier

determines values for an unknown continuous variable behavior or estimated future value.

estimation

what is the creation of a virtual version of computing resources, such as an operating system, a server, a storage device, or network resources?

virtualization

different forms of structured and unstructured data.

variety

the uncertainty of data, including biases, noise, and abnormalities.

veracity

the scale of data.

volume

the analysis of streaming data as it travels around the internet.

velocity

what is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set?

anomaly detection

is a data-mining algorithm that analyzes a customers purchases and actions on a website and then uses the data to recommend complementary products.

recommendation engine

what reveals the relationship between variables along with the nature and frequency of the relationships?

affinity grouping analysis

is the process of sharing information to ensure consistency between multiple data sources.

data replication

a statistical process that finds a way to make a design, system, or decision as effective as possible.

optimization model

forecasts are predictions based on time-series information allowing users to manipulate the time series for forecasting activities.

forecasting model

a statistical process for estimating the relationships among variables.

regression model

time-stamped information collected at a particular frequency.

time-series information

is the process of analyzing data to extract information not offered by the raw data alone.

data mining

occurs when the user goes into an emotional state of over-analysis a situation so that a decision or action is never taken, in effect paralyzing the outcome.

analysis paralysis

who is a business analytics specialists who uses visual tools to help people understand complex data?

data artists

what presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?

infographics

what is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted?

brainstorming

supports general business processes and does not require any specific software customization to meet the organizations needs.

off-the-shelf application software

who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?

project manager

uses both the legacy system and new system until all users verify that the new system functions correctly

parellel implementation

discards the legacy system and immediately migrates all users to the new system.

plunge implementation

assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.

pilot implementation

installs the new systems in phases until it is verified that it works correctly.

phased implementation

what are the phases in the systems development life cycle?

1. planning
2. analysis
3. design
4. development
5. testing
6. implementation/maintenance

in the ________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operation of the intended system.

analysis phase

which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?

maintenance phase

what phase establishes a high-level plan of the intended project and determines project goals.

planning phase

what is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?

COBIT

what is a temporary activity a company undertakes to create a unique product, service, or result.

project

in the _________________ phase, the organization places the system into production so users can begin to perform actual business operation with it.

implementation

describes the business need and the justification, requirements, and current boundaries for the project.

the project scope

assess if the entire system meets the design requirements of the users.

alpha testing

test the system to ensure it is bug-free.

development testing

verify that separate systems can work together, passing data back and forth correctly.

integration testing

verify that the units or pieces of code function correctly when integrated.

system testing

determine if the system satisfies the user and business requirements.

user acceptable testing (UAT)

test individual units or pieces of code for a system.

unit testing

what is the process of transferring information from a legacy system to a new system.

conversion

detail the steps the system must perform along with the expected result of each step.

test conditions

is the overall process for developing information systems, from planning and analysis through implementation and maintenance.

the system development life cycle

is the interface to an information system.

the graphical user inderface

what groups data and corresponding processes into objects?

object-orientated languages

what illustrates the movement of information between external entities and the processes and data stores within the system?

data flow diagram

makes system changes to reduce the chance of future system failure.

preventive maintenance

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defines in the analysis phase.

testing phase

what is the process of managing changes to the business requirements throughout the project?

requirements management

defects in the code of an information system.

bugs

what is a programming method that provides for interactive modules to a website?

scripting language

what is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

project managements

what phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation.

design phase

is created that highlights how to use the system and how to troubleshoot issues or problems.

user documentation

which tools do software engineers use to automate support for the development of the system?

CASE tools

makes system changes to repair design flaws, coding errors, or implementation issues.

corrective maintenance

is a person or event that is the catalyst for implementing major changes for a system to meet business changes.

change agent

is the electronic defacing of an existing website.

cybervandalism

what is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

typosquatting

what are 3 reasons why organizations should develop written epolicies?

1. establish employee procedures
2. establish organizational rules
3. establish employee guidelines

what number has the most widespread unintentional information reuse?

social security number

which privacy policy details the extent to which email messages may be read by others?

email privacy policy

a program that records every keystroke and mouse click.

key logger

a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

hardware key logger

a small file deposited on a hard drive by a website containing information about customers and their web activities.

cookie

software that generates ads that install themselves on a computer when a person downloads some other program from the internet.

adware

software that comes hidden in free downloadable software and tracks online movements.

spyware

consists of one line of information fro every visitor to a website and is usually stored on a web server.

web log

records information about a customer during a web surfing session such as what websites were visited.

clickstream

is the government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens.

internet censorship

which epolicy contains general principles regarding information privacy?

information privacy policy

what are 3 epolicies?

1. acceptable use policy
2. social media policy
3. ethical computer use policy

what policy contains general principles to guide computer use behavior.

ethical computer use policy

what is a computer crime where a competitor or disgruntled employee increases a compnays seach advertising costs by repeatedly clicking on the advertisers link?

competitive click-fraud

physical security is _________________ protection such as alarms, guards, fireproof doors, fences, and vaults.

tangible

requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.

acceptable use policy

what is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

click-fraud

what are policies and procedures that address information management along with the ethical use of computers and the internet in the business environment?

epolicies

is the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner

website name stealing

is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

fair information practices

what is an anti spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

teergrubing

is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

typosquatting

what tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed?

workplace MIS monitoring