what contains a subset of data warehouse information?
data mart
is a storage repository that holds a vast amount of raw data in its original format until the business needs it.
data lake
what describes the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete information. (2)
1. information cleansing
2. information scrubbing
is a business that collects personal information about consumers and sells that information to other organizations.
data broker
what is erroneous or flawed data?
dirty data
what is a technique for establishing a match, or balance, between the source data and the target data warehouse?
data map
is the collection of data from various sources for the purpose of data processing.
data aggregation
is a central location in which data is stored.
repository
what is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse?
extraction, transformation, and loading
is an individual item on a graph or a chart.
data point
what is an organized collection of data?
data set
what can compare two or more data sets to identify patterns and trends?
comparative analysis
is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks
data warehouse
data identifies the primary location where data is collected.
source data
what occurs when a company keeps tabs of its copetitors activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?
competitive monitoring
what is the solution to the problem of being data rich and information poor?
business intelligence
is an approach to business governance that values decisions that can be backed up with verifiable data.
data-driven decision management
what statement accurately defines the problems with too much information?
data rich, information poor
can compare two or more data sets to identify patterns and trends.
comparative analysis
use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making.
data mining tools
who extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information?
data scientists
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.
cluster analysis
reveals the relationship between variable along with the nature and frequency of the relationships.
affinity grouping analysis
the process of organizing data into categories or groups for its most effective and efficient use.
classification analysis
what processes and manages algorithms across many machines in a computing environment?
distributed computing
describes technologies that allow users to "see" or visualize data to transform information into a business perspective.
data visualization
what tracks corporate metrics such as critical success factors and key performance indicators advanced capabilities such as interactive controls allowing users to manipulate data for analysis?
business intelligence dashboards
the classification or labeling of an identified pattern in the machine learning process.
pattern recognition analysis
determines a statistical relationship between variables, often for the purpose of identifying predictive factors among the variables.
correlation analysis
analyzes text flowing across the internet, including unstructured text from blogs and messages.
social media analysis
identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables.
exploratory data analysis
the process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise.
speech analysis
analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
web analysis
analyzes unstructured data to find trends and patterns in words and sentences.
text analysis
is a statement about what will happen or might happen in the future.
prediction
what is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?
fast data
what is a data value that is numerically distant from most of the other data points in a set of data?
outlier
determines values for an unknown continuous variable behavior or estimated future value.
estimation
what is the creation of a virtual version of computing resources, such as an operating system, a server, a storage device, or network resources?
virtualization
different forms of structured and unstructured data.
variety
the uncertainty of data, including biases, noise, and abnormalities.
veracity
the scale of data.
volume
the analysis of streaming data as it travels around the internet.
velocity
what is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set?
anomaly detection
is a data-mining algorithm that analyzes a customers purchases and actions on a website and then uses the data to recommend complementary products.
recommendation engine
what reveals the relationship between variables along with the nature and frequency of the relationships?
affinity grouping analysis
is the process of sharing information to ensure consistency between multiple data sources.
data replication
a statistical process that finds a way to make a design, system, or decision as effective as possible.
optimization model
forecasts are predictions based on time-series information allowing users to manipulate the time series for forecasting activities.
forecasting model
a statistical process for estimating the relationships among variables.
regression model
time-stamped information collected at a particular frequency.
time-series information
is the process of analyzing data to extract information not offered by the raw data alone.
data mining
occurs when the user goes into an emotional state of over-analysis a situation so that a decision or action is never taken, in effect paralyzing the outcome.
analysis paralysis
who is a business analytics specialists who uses visual tools to help people understand complex data?
data artists
what presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?
infographics
what is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted?
brainstorming
supports general business processes and does not require any specific software customization to meet the organizations needs.
off-the-shelf application software
who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?
project manager
uses both the legacy system and new system until all users verify that the new system functions correctly
parellel implementation
discards the legacy system and immediately migrates all users to the new system.
plunge implementation
assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.
pilot implementation
installs the new systems in phases until it is verified that it works correctly.
phased implementation
what are the phases in the systems development life cycle?
1. planning
2. analysis
3. design
4. development
5. testing
6. implementation/maintenance
in the ________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operation of the intended system.
analysis phase
which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?
maintenance phase
what phase establishes a high-level plan of the intended project and determines project goals.
planning phase
what is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?
COBIT
what is a temporary activity a company undertakes to create a unique product, service, or result.
project
in the _________________ phase, the organization places the system into production so users can begin to perform actual business operation with it.
implementation
describes the business need and the justification, requirements, and current boundaries for the project.
the project scope
assess if the entire system meets the design requirements of the users.
alpha testing
test the system to ensure it is bug-free.
development testing
verify that separate systems can work together, passing data back and forth correctly.
integration testing
verify that the units or pieces of code function correctly when integrated.
system testing
determine if the system satisfies the user and business requirements.
user acceptable testing (UAT)
test individual units or pieces of code for a system.
unit testing
what is the process of transferring information from a legacy system to a new system.
conversion
detail the steps the system must perform along with the expected result of each step.
test conditions
is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
the system development life cycle
is the interface to an information system.
the graphical user inderface
what groups data and corresponding processes into objects?
object-orientated languages
what illustrates the movement of information between external entities and the processes and data stores within the system?
data flow diagram
makes system changes to reduce the chance of future system failure.
preventive maintenance
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defines in the analysis phase.
testing phase
what is the process of managing changes to the business requirements throughout the project?
requirements management
defects in the code of an information system.
bugs
what is a programming method that provides for interactive modules to a website?
scripting language
what is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?
project managements
what phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
design phase
is created that highlights how to use the system and how to troubleshoot issues or problems.
user documentation
which tools do software engineers use to automate support for the development of the system?
CASE tools
makes system changes to repair design flaws, coding errors, or implementation issues.
corrective maintenance
is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
change agent
is the electronic defacing of an existing website.
cybervandalism
what is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
typosquatting
what are 3 reasons why organizations should develop written epolicies?
1. establish employee procedures
2. establish organizational rules
3. establish employee guidelines
what number has the most widespread unintentional information reuse?
social security number
which privacy policy details the extent to which email messages may be read by others?
email privacy policy
a program that records every keystroke and mouse click.
key logger
a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
hardware key logger
a small file deposited on a hard drive by a website containing information about customers and their web activities.
cookie
software that generates ads that install themselves on a computer when a person downloads some other program from the internet.
adware
software that comes hidden in free downloadable software and tracks online movements.
spyware
consists of one line of information fro every visitor to a website and is usually stored on a web server.
web log
records information about a customer during a web surfing session such as what websites were visited.
clickstream
is the government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens.
internet censorship
which epolicy contains general principles regarding information privacy?
information privacy policy
what are 3 epolicies?
1. acceptable use policy
2. social media policy
3. ethical computer use policy
what policy contains general principles to guide computer use behavior.
ethical computer use policy
what is a computer crime where a competitor or disgruntled employee increases a compnays seach advertising costs by repeatedly clicking on the advertisers link?
competitive click-fraud
physical security is _________________ protection such as alarms, guards, fireproof doors, fences, and vaults.
tangible
requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
acceptable use policy
what is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
click-fraud
what are policies and procedures that address information management along with the ethical use of computers and the internet in the business environment?
epolicies
is the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
website name stealing
is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
fair information practices
what is an anti spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?
teergrubing
is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
typosquatting
what tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed?
workplace MIS monitoring