• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
Define or explain EAI
Leverages existing system, and enables gradual move to ERP
it integrates existing applications together and connects system "islands" via new software layers. It also enables existing applications to communicate and share data, + provide intergrated information.
CRM is called what kind of a system?
functional system
ERP is basically what
is one database to one platform
DBMS is what, and explain how it is created and how it works
is software that mages the database or how you create the database using keys and rows and columns. In the form of reports, queries, and forms
soft skills are like what
collaboration, critical thinking, abstract thinking, system thinking
Name all of the characteristics of data
accurate, timely, relevant, barely sufficient, worth its cost
Porter's 5 forces are broken down into what two types of forces?
competitive and bargaining
name all of the actual forces of porters 5 forces
competitive from: vendors of substitutes, new competitors, existing rivals
bargaining power from: from suppliers, from customers
what are porters four competitive strategies
cost and differentiation - industry wide and focus
what tables are missing either a primary key or a foreign key from the northwinds ERP
orderdetails and categories
denial of service
when someone overloads the server = twitter and Ellen
what is the protocol that helps build a website
html
How is a IP address different from a URL
IP address is the # that is given to the website and the URL is the name (letters) that are given to the website
what is the difference between a WAN and a LAN
LAN is hard wired within one building (FSB) and WAN is hardware that connects a campus from building to building
What happens if one company is the supply chain optimizes
profitability goes down
-money comes from customers in supply chain
what is a inter-enterprise system - uses example
when Proctor and gamble uses walmart's system to stock their shelves
what are the better type of relationships in social networking
weak relationships are better then strong ones
who manages the relationship in a social CRM
the customers
explain what data mining does
Business Intel systems that process data using sophisticated statistical techniques, such as regression analysis and decision tree analysis
what are some problems with raw data
Dirty
Missing Values

Inconsistent

Not Integrated

Wrong granularity

Too much data
big data describes data how
describes data collections that are characterized by huge(everything) volume, velocity, variety, veracity.
what is the curse of dimensionality
when you have too many attributes of data.
What does granularity refer to when talking about data?
Better to error on fine data, course data is hard to tune up
fine data is called what
clickstream data
system development life cycle is reffered to as what?
a water fall
what is the process of systems development life cycle
1. System definition
2. Requirements analysis
3. Component design
4. Implementation
5. maintenance
in what phase do you determine what the feasibility is in the systems development life cycle
system definition phase
what are the two biggest risk of outsourcing
loss of control and no easy exit
what do companies outsource
cost, economies of scale, reduce management time, acquire specialization
What is the difference between phishing and pretexting
pretexting is trying to gather information over the phone and phisning is trying to gather information over email
spoofing is what
is when you pretend to be someone using the wrong IP address
What are the 3 types of security safeguards
technical, data, human
what is the virus software name that protects you from malware
firmware
a permaniter firewall is what
ones on a network that and then you having one on your own desktop is a secondary peramiter
VPN acts like what
a tunnel
a vpn is allows you to be where and doing
in china or a different location from miami, and access miami's servers securely
systemic is what
a one time use (more secure)
asytemic is what
is a reused key
normally how do public and private keys work (think amazon)
amazon send you a public key and you send it back to them and they decode it with their private key
if you don't have a byod policy then you have what amount of what two things
low control, low functionality
thin cilent uses what to get to the browser for the application
HTML
how do compines model their BPM
they try to become more EFFICIENT and MORE EFFECTIVE
why do companies use BPMN
it is one language that everyone can understand