Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
- 3rd side (hint)
Data generated by business apps, sensors, and transaction processing systems (TPS) are typically stored in a _____ |
Database
|
Read section 7.4 Database Technology
|
|
Integrates data from multiple databases and data silos and organize them for complex analysis, knowledge discovery, and to support decision-making.
|
Data Warehouses
|
Read section 7.4 Database Technology
|
|
A small-scale data warehouse that support a single function or department. |
Data Mart
|
Read section 7.4 Database Technology |
|
Key advantage of an Active Data Warehouse (ADW).
|
Constantly updated, providing more current information
|
Read section 3.2 Data Warehouse and Data Mart Technology, concentrate on the "Real-Time Support From Active Data Warehouse (ADW)" section |
|
Transforms data into usable, actionable business information.
|
Business Intelligence (BI)
|
Read section 7.4 Database Technology
|
|
These are benefits of a Document Management System (DMS)
|
1. Enabling the company to access and use the content contained in the documents 2. Cutting labor costs by automating business processes 3. Reducing the time and effort required to locate information the business needs to support decision-making 4. Improving the security of the content, thereby reducing the risk of intellectual property theft 5. Minimizing the costs associated with printing, storing, and searching for content
|
Read section 3.5 Digital and Physical Document Management, concentrate on the "Business Records" section |
|
A technique for building applications that combine data from multiple sources to create an integrated experience
|
Mashup
|
Read section 11.2 Enterprise Data Mashups |
|
Provides a visual snapshots of an organization’s critical operational data or key performance indicators (KPIs)
|
Business dashboards
|
Read section 11.3 Business Dashboards, concentrate on the "Business Dashboards" section
|
|
Benefit of enterprise mashup apps
|
operational efficiency, optimize the sales pipeline, enhance customer satisfaction, and drive profitability
|
Read section 11.2 Enterprise Data Mashups, concentrate on the "Why Business Users Need Data Mashup Technology" section |
|
The trend of people using their personal mobile devices at work.
|
Bring your own device (BYOD)
|
Read chapter 5 CyberSecurity, Compliance, and Business Continuity, concentrate on the "QUICK LOOK at Chapter 5, CyberSecurity, Compliance, and Business Continuity" section
|
|
The chief concern about smartphones for work purposes.
|
Smartphones do not have anti-malware or data encryption apps, creating a security problem with respect to any confidential business data stored on the device.
|
Read chapter 5 CyberSecurity, Compliance, and Business Continuity, concentrate on the "QUICK LOOK at Chapter 5, CyberSecurity, Compliance, and Business Continuity" section
|
|
Type of attack where a web site or network is bombarded with traffic to make them crash.
|
Denial of Service (DoS)
|
Read section 5.1 Up Close Look at Cybercrimes, Criminals, and Motivations, concentrate on the "High-Visibility Cybercriminals and Hacktivists" section
|
|
Cybersecurity definition of a threat.
|
Something or someone that may result in harm to an asset
|
Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms" |
|
Cybersecurity definition of vulnerability.
|
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset
|
Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms"
|
|
A software or hardware device that controls access to their private network from the Internet by analyzing data packets entering or exiting it.
|
Firewall
|
Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms"
|
|
A combination of upper- and lower-case letters, numbers, and punctuation marks, and at least eight characters long although ten characters is better.
|
Strong passwords
|
Read section 5.2 IS Vulnerabilities and Threats, concentrate on the "Vulnerabilities" section |
|
The objective of IT security management practices is to defend ______
|
Data, hardware, software applications, and networks
|
Read section 5.4 Information Assurance and Risk Management
|
|
Data warehouse and data marts are optimized for ___.
|
OLAP, data mining, BI, and decision support
|
Read section 3 3.1 Database Technology, , concentrate on the "Databases Are Optimized For Transactions and Queries " section |
|
These are the tiers, or layers, of a mashup app.
|
Presentation, Logic, Data
|
Read section 11.2 Enterprise Data Mashups, concentrate on Tech Note 11.3
|
|
Challenges related to managing employee owned mobile devices used for work related purposes
|
Device Control Cost, Security Threats, Compliance, Privacy |
Read chapter 5, Managing BYOD Security Risks, concentrate on the "Gaining Control of the BYOD Megatrend" section |