Business Systems
systems are information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. As information systems, BI systems have the five standard compo
Business Intelligence
these patterns, relationships, trends, and predictions are referred to as business intelligence.
3 primary activities in the BI process
The three primary activities in the BI process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. BI analysis is the process of creating busin
The four fundamental categories of BI analysis
reporting, data mining, BigData, and knowledge management.
publish results
is the process of delivering business intelligence to the knowledge workers who need it. Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an
pull publishing
Pull publishing requires the user to request BI results. Publishing media include print as well as online content delivered via Web servers, specialized Web servers known as report servers, and BI results that are sent via automation to other programs.
Functions of data warehouses and the need for them.
...
Describe the features of a data mart.
A data mart is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store i
What is OLAP?
Online analytical processing (OLAP) is an important reporting application. It is more generic than RFM. OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OL
Features of OLAP
An OLAP report has measures and dimensions. A measure is the data item of interest. It is the item that is to be summed or averaged or otherwise processed in the OLAP report. Total sales, average sales, and average cost are examples of measures. A dimensi
Explain the concept of RFM analysis
RFM analysis, a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns. RFM considers how recently (R) a customer has ordered, how frequently (F) a customer ordered, and
What are MapReduce
MapReduce is a technique for harnessing the power of thousands of computers working in parallel. The basic idea is that the BigData collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of
what are Hadoop
is an open-source program supported by the Apache Foundation that implements MapReduce on potentially thousands of computers. Hadoop could drive the process of finding and counting the Google search terms, but Google uses its own proprietary version of Ma
What is threat?
A threat is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
What is vulnerability?
A vulnerability is an opportunity for threats to gain access to individual or organizational assets. For example, when an individual buys something online, he or she provides his or her credit card data; when that data is transmitted over the Internet, it
What is safeguard ?
A safeguard is some measure that individuals or organizations take to block the threat from obtaining the asset.
What are the three general sources of security threats?
A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters.
Human error
Human errors and mistakes include accidental problems caused by both employees and non employees.
Computer crime
includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems.
Natural events
and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the
Pretexting
Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers.
Phishing
is a similar technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, an
Spoofing
is another term for someone pretending to be someone else. IP spoofing occurs when an
Final Exam Study Guide MIS 101 Page 4 of 5
intruder uses another site's IP address to masquerade as that other site.
Sniffing
is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required.
List various personal security safeguards.
� One should take security seriously.
� One should create strong passwords.
� One should use multiple passwords.
� One should not send valuable data via email or IM.
� One should use https at trusted, reputable vendors.
� One should remove high-value asse
What is the difference between Business analyst and System Analyst?
...
What is Scrum and its characteristics
...
Describe the composition of a development team for an information system (IS).
...
What are the phases of SDLC and what are their significance?
The phases of the systems development life cycle are:
� Define the system
� Determine the requirements
� Design system components
� Implement the system
� Maintain the system
Phase 1 SLDC: Planning
This is the first phase in the systems development process. It identifies whether or not there is the need for a new system to achieve a business"s strategic objectives. This is a preliminary plan (or a feasibility study) for a company"s business initiati
Phase 2 SLDC: Systems Analysis and Requirements
The second phase is where businesses will work on the source of their problem or the need for a change. In the event of a problem, possible solutions are submitted and analyzed to identify the best fit for the ultimate goal(s) of the project. This is wher
Phase 3 SLDC: Systems Design
The third phase describes, in detail, the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place. This is the step for end users to discuss and determine their specific
Phase 4 SLDC: Development
The fourth phase is when the real work begins�in particular, when a programmer, network engineer and/or database developer are brought on to do the major work on the project. This work includes using a flow chart to ensure that the process of the system i
Phase 5 SLDC: Integration and Testing
The fifth phase involves systems integration and system testing (of programs and procedures)�normally carried out by a Quality Assurance (QA) professional�to determine if the proposed design meets the initial set of business goals. Testing may be repeated
Phase 6 SLDC: Implementation
The sixth phase is when the majority of the code for the program is written. Additionally, this phase involves the actual installation of the newly-developed system. This step puts the project into production by moving the data and components from the old
Phase 7 SLDC: Operations and Maintenance
The seventh and final phase involves maintenance and regular required updates. This step is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.
Importance of the SDLC
If a business determines a change is needed during any phase of the SDLC, the company might have to proceed through all the above life cycle phases again. The life cycle approach of any project is a time-consuming process. Even though some steps are more
Waterfall vs Agile methodology?
...
Waterfall
is a linear approach to software development. In this methodology, the sequence of events is something like:
Gather and document requirements
Design
Code and unit test
Perform system testing
Perform user acceptance testing (UAT)
Fix any issues
Deliver the
Agile
is an iterative, team-based approach to development. This approach emphasizes the rapid delivery of an application in complete functional components. Rather than creating tasks and schedules, all time is "time-boxed" into phases called "sprints." Each spr
Making the Choice Between Agile and Waterfall
So, how do we choose? First, we change the game a little (which is what most software development organizations do) by defining our own process. At Segue, it's called our Process Framework, and it's a variation on the traditional Waterfall methodology. Ou
Agile develoment
agile development methodologies are generic. They can be applied to the creation of business processes, information systems, and applications.
Agile development step 1
First, scrum and the other agile techniques expect and even welcome change. Because systems are created to help organizations and people achieve their strategies, and the more the requirements change, the closer they come to facilitating strategies. The r
Agile development step 2
Second, scrum and other agile development processes are designed to frequently deliver a working version of some part of the product. Frequently means one to eight weeks, not longer. This frequency means that management is at risk only for whatever costs
Agile development step 4
The fourth principle is a tough one for many developers to accept. Rather than design the complete, overall system at the beginning, only those portions of the design that are needed to complete the current work are done. Sometimes this is called just-in-
Agile development step 3
the third principle is that the development team will work closely with the customer, until the project ends. Someone who knows the business requirements must be available to the development team and must be able and willing to clearly express, clarify, a