MIS Final

Business Systems

systems are information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. As information systems, BI systems have the five standard compo

Business Intelligence

these patterns, relationships, trends, and predictions are referred to as business intelligence.

3 primary activities in the BI process

The three primary activities in the BI process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. BI analysis is the process of creating busin

The four fundamental categories of BI analysis

reporting, data mining, BigData, and knowledge management.

publish results

is the process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an

pull publishing

Pull publishing requires the user to request BI results. Publishing media include print as well as online content delivered via Web servers, specialized Web servers known as report servers, and BI results that are sent via automation to other programs.

Functions of data warehouses and the need for them.

...

Describe the features of a data mart.

A data mart is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store i

What is OLAP?

Online analytical processing (OLAP) is an important reporting application. It is more generic than RFM. OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OL

Features of OLAP

An OLAP report has measures and dimensions. A measure is the data item of interest. It is the item that is to be summed or averaged or otherwise processed in the OLAP report. Total sales, average sales, and average cost are examples of measures. A dimensi

Explain the concept of RFM analysis

RFM analysis, a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns. RFM considers how recently (R) a customer has ordered, how frequently (F) a customer ordered, and

What are MapReduce

MapReduce is a technique for harnessing the power of thousands of computers working in parallel. The basic idea is that the BigData collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of

what are Hadoop

is an open-source program supported by the Apache Foundation that implements MapReduce on potentially thousands of computers. Hadoop could drive the process of finding and counting the Google search terms, but Google uses its own proprietary version of Ma

What is threat?

A threat is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

What is vulnerability?

A vulnerability is an opportunity for threats to gain access to individual or organizational assets. For example, when an individual buys something online, he or she provides his or her credit card data; when that data is transmitted over the Internet, it

What is safeguard ?

A safeguard is some measure that individuals or organizations take to block the threat from obtaining the asset.

What are the three general sources of security threats?

A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters.

Human error

Human errors and mistakes include accidental problems caused by both employees and non employees.

Computer crime

includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems.

Natural events

and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the

Pretexting

Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers.

Phishing

is a similar technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, an

Spoofing

is another term for someone pretending to be someone else. IP spoofing occurs when an
Final Exam Study Guide MIS 101 Page 4 of 5
intruder uses another site's IP address to masquerade as that other site.

Sniffing

is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required.

List various personal security safeguards.

� One should take security seriously.
� One should create strong passwords.
� One should use multiple passwords.
� One should not send valuable data via email or IM.
� One should use https at trusted, reputable vendors.
� One should remove high-value asse

What is the difference between Business analyst and System Analyst?

...

What is Scrum and its characteristics

...

Describe the composition of a development team for an information system (IS).

...

What are the phases of SDLC and what are their significance?

The phases of the systems development life cycle are:
� Define the system
� Determine the requirements
� Design system components
� Implement the system
� Maintain the system

Phase 1 SLDC: Planning

This is the first phase in the systems development process. It identifies whether or not there is the need for a new system to achieve a business"s strategic objectives. This is a preliminary plan (or a feasibility study) for a company"s business initiati

Phase 2 SLDC: Systems Analysis and Requirements

The second phase is where businesses will work on the source of their problem or the need for a change. In the event of a problem, possible solutions are submitted and analyzed to identify the best fit for the ultimate goal(s) of the project. This is wher

Phase 3 SLDC: Systems Design

The third phase describes, in detail, the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place. This is the step for end users to discuss and determine their specific

Phase 4 SLDC: Development

The fourth phase is when the real work begins�in particular, when a programmer, network engineer and/or database developer are brought on to do the major work on the project. This work includes using a flow chart to ensure that the process of the system i

Phase 5 SLDC: Integration and Testing

The fifth phase involves systems integration and system testing (of programs and procedures)�normally carried out by a Quality Assurance (QA) professional�to determine if the proposed design meets the initial set of business goals. Testing may be repeated

Phase 6 SLDC: Implementation

The sixth phase is when the majority of the code for the program is written. Additionally, this phase involves the actual installation of the newly-developed system. This step puts the project into production by moving the data and components from the old

Phase 7 SLDC: Operations and Maintenance

The seventh and final phase involves maintenance and regular required updates. This step is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.

Importance of the SDLC

If a business determines a change is needed during any phase of the SDLC, the company might have to proceed through all the above life cycle phases again. The life cycle approach of any project is a time-consuming process. Even though some steps are more

Waterfall vs Agile methodology?

...

Waterfall

is a linear approach to software development. In this methodology, the sequence of events is something like:
Gather and document requirements
Design
Code and unit test
Perform system testing
Perform user acceptance testing (UAT)
Fix any issues
Deliver the

Agile

is an iterative, team-based approach to development. This approach emphasizes the rapid delivery of an application in complete functional components. Rather than creating tasks and schedules, all time is "time-boxed" into phases called "sprints." Each spr

Making the Choice Between Agile and Waterfall

So, how do we choose? First, we change the game a little (which is what most software development organizations do) by defining our own process. At Segue, it's called our Process Framework, and it's a variation on the traditional Waterfall methodology. Ou

Agile develoment

agile development methodologies are generic. They can be applied to the creation of business processes, information systems, and applications.

Agile development step 1

First, scrum and the other agile techniques expect and even welcome change. Because systems are created to help organizations and people achieve their strategies, and the more the requirements change, the closer they come to facilitating strategies. The r

Agile development step 2

Second, scrum and other agile development processes are designed to frequently deliver a working version of some part of the product. Frequently means one to eight weeks, not longer. This frequency means that management is at risk only for whatever costs

Agile development step 4

The fourth principle is a tough one for many developers to accept. Rather than design the complete, overall system at the beginning, only those portions of the design that are needed to complete the current work are done. Sometimes this is called just-in-

Agile development step 3

the third principle is that the development team will work closely with the customer, until the project ends. Someone who knows the business requirements must be available to the development team and must be able and willing to clearly express, clarify, a