Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
Define or explain EAI
|
Leverages existing system, and enables gradual move to ERP
it integrates existing applications together and connects system "islands" via new software layers. It also enables existing applications to communicate and share data, + provide intergrated information. |
|
CRM is called what kind of a system?
|
functional system
|
|
ERP is basically what
|
is one database to one platform
|
|
DBMS is what, and explain how it is created and how it works
|
is software that mages the database or how you create the database using keys and rows and columns. In the form of reports, queries, and forms
|
|
soft skills are like what
|
collaboration, critical thinking, abstract thinking, system thinking
|
|
Name all of the characteristics of data
|
accurate, timely, relevant, barely sufficient, worth its cost
|
|
Porter's 5 forces are broken down into what two types of forces?
|
competitive and bargaining
|
|
name all of the actual forces of porters 5 forces
|
competitive from: vendors of substitutes, new competitors, existing rivals
bargaining power from: from suppliers, from customers |
|
what are porters four competitive strategies
|
cost and differentiation - industry wide and focus
|
|
what tables are missing either a primary key or a foreign key from the northwinds ERP
|
orderdetails and categories
|
|
denial of service
|
when someone overloads the server = twitter and Ellen
|
|
what is the protocol that helps build a website
|
html
|
|
How is a IP address different from a URL
|
IP address is the # that is given to the website and the URL is the name (letters) that are given to the website
|
|
what is the difference between a WAN and a LAN
|
LAN is hard wired within one building (FSB) and WAN is hardware that connects a campus from building to building
|
|
What happens if one company is the supply chain optimizes
|
profitability goes down
-money comes from customers in supply chain |
|
what is a inter-enterprise system - uses example
|
when Proctor and gamble uses walmart's system to stock their shelves
|
|
what are the better type of relationships in social networking
|
weak relationships are better then strong ones
|
|
who manages the relationship in a social CRM
|
the customers
|
|
explain what data mining does
|
Business Intel systems that process data using sophisticated statistical techniques, such as regression analysis and decision tree analysis
|
|
what are some problems with raw data
|
Dirty
Missing Values Inconsistent Not Integrated Wrong granularity Too much data |
|
big data describes data how
|
describes data collections that are characterized by huge(everything) volume, velocity, variety, veracity.
|
|
what is the curse of dimensionality
|
when you have too many attributes of data.
|
|
What does granularity refer to when talking about data?
|
Better to error on fine data, course data is hard to tune up
|
|
fine data is called what
|
clickstream data
|
|
system development life cycle is reffered to as what?
|
a water fall
|
|
what is the process of systems development life cycle
|
1. System definition
2. Requirements analysis 3. Component design 4. Implementation 5. maintenance |
|
in what phase do you determine what the feasibility is in the systems development life cycle
|
system definition phase
|
|
what are the two biggest risk of outsourcing
|
loss of control and no easy exit
|
|
what do companies outsource
|
cost, economies of scale, reduce management time, acquire specialization
|
|
What is the difference between phishing and pretexting
|
pretexting is trying to gather information over the phone and phisning is trying to gather information over email
|
|
spoofing is what
|
is when you pretend to be someone using the wrong IP address
|
|
What are the 3 types of security safeguards
|
technical, data, human
|
|
what is the virus software name that protects you from malware
|
firmware
|
|
a permaniter firewall is what
|
ones on a network that and then you having one on your own desktop is a secondary peramiter
|
|
VPN acts like what
|
a tunnel
|
|
a vpn is allows you to be where and doing
|
in china or a different location from miami, and access miami's servers securely
|
|
systemic is what
|
a one time use (more secure)
|
|
asytemic is what
|
is a reused key
|
|
normally how do public and private keys work (think amazon)
|
amazon send you a public key and you send it back to them and they decode it with their private key
|
|
if you don't have a byod policy then you have what amount of what two things
|
low control, low functionality
|
|
thin cilent uses what to get to the browser for the application
|
HTML
|
|
how do compines model their BPM
|
they try to become more EFFICIENT and MORE EFFECTIVE
|
|
why do companies use BPMN
|
it is one language that everyone can understand
|