• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Data generated by business apps, sensors, and transaction processing systems (TPS) are typically stored in a _____

Database
Read section 7.4 Database Technology
Integrates data from multiple databases and data silos and organize them for complex analysis, knowledge discovery, and to support decision-making.
Data Warehouses
Read section 7.4 Database Technology

A small-scale data warehouse that support a single function or department.

Data Mart

Read section 7.4 Database Technology

Key advantage of an Active Data Warehouse (ADW).
Constantly updated, providing more current information

Read section 3.2 Data Warehouse and Data Mart Technology, concentrate on the "Real-Time Support From Active Data Warehouse (ADW)" section

Transforms data into usable, actionable business information.
Business Intelligence (BI)
Read section 7.4 Database Technology
These are benefits of a Document Management System (DMS)
1. Enabling the company to access and use the content contained in the documents 2. Cutting labor costs by automating business processes 3. Reducing the time and effort required to locate information the business needs to support decision-making 4. Improving the security of the content, thereby reducing the risk of intellectual property theft 5. Minimizing the costs associated with printing, storing, and searching for content

Read section 3.5 Digital and Physical Document Management, concentrate on the "Business Records" section

A technique for building applications that combine data from multiple sources to create an integrated experience
Mashup

Read section 11.2 Enterprise Data Mashups

Provides a visual snapshots of an organization’s critical operational data or key performance indicators (KPIs)
Business dashboards
Read section 11.3 Business Dashboards, concentrate on the "Business Dashboards" section
Benefit of enterprise mashup apps
operational efficiency, optimize the sales pipeline, enhance customer satisfaction, and drive profitability

Read section 11.2 Enterprise Data Mashups, concentrate on the "Why Business Users Need Data Mashup Technology" section

The trend of people using their personal mobile devices at work.
Bring your own device (BYOD)
Read chapter 5 CyberSecurity, Compliance, and Business Continuity, concentrate on the "QUICK LOOK at Chapter 5, CyberSecurity, Compliance, and Business Continuity" section
The chief concern about smartphones for work purposes.
Smartphones do not have anti-malware or data encryption apps, creating a security problem with respect to any confidential business data stored on the device.
Read chapter 5 CyberSecurity, Compliance, and Business Continuity, concentrate on the "QUICK LOOK at Chapter 5, CyberSecurity, Compliance, and Business Continuity" section
Type of attack where a web site or network is bombarded with traffic to make them crash.
Denial of Service (DoS)
Read section 5.1 Up Close Look at Cybercrimes, Criminals, and Motivations, concentrate on the "High-Visibility Cybercriminals and Hacktivists" section
Cybersecurity definition of a threat.
Something or someone that may result in harm to an asset

Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms"

Cybersecurity definition of vulnerability.
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset
Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms"
A software or hardware device that controls access to their private network from the Internet by analyzing data packets entering or exiting it.
Firewall
Read section 5.2 IS Vulnerabilities and Threats, concentrate on table 5.1 "Cybersecurity Terms"
A combination of upper- and lower-case letters, numbers, and punctuation marks, and at least eight characters long although ten characters is better.
Strong passwords

Read section 5.2 IS Vulnerabilities and Threats, concentrate on the "Vulnerabilities" section

The objective of IT security management practices is to defend ______
Data, hardware, software applications, and networks
Read section 5.4 Information Assurance and Risk Management
Data warehouse and data marts are optimized for ___.
OLAP, data mining, BI, and decision support

Read section 3 3.1 Database Technology, , concentrate on the "Databases Are Optimized For Transactions and Queries " section

These are the tiers, or layers, of a mashup app.
Presentation, Logic, Data
Read section 11.2 Enterprise Data Mashups, concentrate on Tech Note 11.3
Challenges related to managing employee owned mobile devices used for work related purposes

Device Control Cost, Security Threats, Compliance, Privacy

Read chapter 5, Managing BYOD Security Risks, concentrate on the "Gaining Control of the BYOD Megatrend" section