Exam3_StudyGuide

docx

School

Liberty University *

*We aren’t endorsed by this school

Course

100

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by ChiefSnow8810

Report
CSIS 100 Spring 2022 EXAM 3 STUDY GUIDE CHAPTER 9 Key Terms o Business Intelligence (BI) o Conversion Funnel o Coefficient of determination (r squared) o CRISP-DM o Dashboard o Data Cube o Data Mining o Data visualization o Drill-down analysis o Key performance indicator (KPI) o Linear Regression o OLAP o Self-service analytics o Word cloud What are the benefits of BI and analytics mentioned in the textbook? What are the goals of business intelligence? What is a data scientist, and what do they do for an organization? What are the characteristics of a successful data scientist? What are the various things that spreadsheet programs, such as Excel, are used for in a business? What components should an organization have in place to gain value from BI and analytics? What is the key to quick responsiveness of OLAP processing? What are the benefits of using a reporting and querying tool? What assumptions must be satisfied when using linear regression on a set of data? What are the three most commonly used data mining techniques and their definitions? Know the commonly used BI tools What are the phases of the CRISP-DM? What is the goal of each phase? What actions can an organization take to ensure an effective self-service analytics program? What are the advantages and disadvantages of using a self- service approach? Regarding data cubes, what can cause you to be unable to use the data cube to answer questions at a more detailed level?
CHAPTER 10 Key Terms o AI/AI System o KM o Informatics o Robotics o Rule o Metadata o Multimedia o Shadowing o BRMS o Explanation Facility o Explicit Know. o Expert System o Neural Network o Vision System o Health Informatics o IF-THEN statement o Perceptive System o Biomedical informatics o Community of Practice o Natural Lang Processing o Enterprise Search & Search Software o Assistive Tech System o Joint Problem Solving o Electronic discovery o Know. Acq. Facility o Knowledge Engineer o Domain Expert o Inference Eng. o Knowledge user o Learning System o Org. Network Analysis o Tacit Know. o VR system o Genetic Algorithm o Intelligent Behavior What are the goals of knowledge management? How are knowledge assets classified? What are the three reasons that many organizations have established KM programs in their IT/HR departments? What are the two processes used to capture tacit knowledge? What is a knowledge base? What are they created from, and what must they be developed for? What are the three techniques that organizations use to employ knowledge management? What are the steps in selling/implementing a knowledge mgmt. project? What are the challenges? Why do knowledge management projects typically recommend starting on a smaller-scale? Know the various tools/technologies used to support KM efforts and what those tools offer What does each node and link represent in an organizational network analysis? What do effective e-discovery software solutions preserve and destroy data based on? What does a knowledge acquisition facility interface between?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Does a knowledge user require previous training in computers or expert systems? What was the first commercially available computer capable of processing information like a human? What are the three ways that this system learns? What can this computer do? What is the Turing Test? What is the Loebner Prize? Know the characteristics of intelligent behavior listed in the textbook What is a brain-computer interface? What are the potential uses of this technology? What does the haptic interface relay in virtual reality? Know the components of an expert system and what is stored in each one/how they interact What is a case-based system? What does the process of solving a current problem/situation involve? What are the various forms of multimedia? How might each one be used in a business? What are the various interface devices used in virtual reality and what are they used for? What does it mean for a virtual reality to be immersive? What does augmented reality refer to? Know the main fields that virtual reality applications are being used in and the benefits to those fields
CHAPTER 11 Key Terms o PERT o Objective o Project risk o Core value o Cost Mgmt. o Risk owner o Scope mgmt o Slack Time o T&M Contract o Time Mgmt. o Vision o WBS o Strategy o SWOT matrix o Project scope o Project sponsor o Tangible Benefit o Gantt chart o Goal o HR mgmt. o Critical Path o Functional Decomp. o Intangible benefit o Make-or-buy decision o Comms mgmt. o Core competency o Cost reimbursable contract o Vision/mission statement o Subject matter expert o Project Steering team o Procurement Mgmt. o Fixed-price Contract o Sponsoring Bus. unit o Project stakeholder o Predecessor task o Project champion o Project deadline o Project int. mgmt. o Project Mgmt. o Project milestone o Project schedule o Quality assurance o Quality mgmt. o Risk management o Strat. Planning o Technical resource o Quality control What are the noted benefits of strategic planning? There are three types listed: issues-based strategic planning, organic strategic planning, and goals-based strategic planning. Know the definitions of each one, and the major phases and steps in the goals-based planning process. What is Michael Porter’s Five Forces Model? What are the fundamental factors listed that determine the level of competition and long-term profitability of an industry? What is the strategic planning pyramid, and what are the various stages within it? What are the basic principles of a good vision? What is a SMART goal?
What should an information system organizational strategy identify? What is it influenced by? What factors should be considered? You should have a good idea of the information in Table 11.5 Know the project classifications, definitions, and associated risk factors. Which has the highest risk? What are the seven perspectives listed to be considered when reviewing and prioritizing IS projects? What are the five parameters that define a project? What happens when one of these changes? What is a useful tool for identifying and documenting the different needs of stakeholders in a project? What are the nine areas of expertise that project managers must coordinate? What trade-off should be considered for scope changes to a project? What is a change process? What is the forming-storming-norming-performing-adjourning model? Know what occurs at each stage Who are the three key members of a steering team? What processes can procurement management be divided into? What are the two key factors to consider in the make-or-buy decision? What is a contract? What are the three main categories of contracts? What are the seven project management processes comprised in project integration management? CHAPTER 13 Key Terms o APT o Antivirus software o Blended threat o Botnet o BYOD o CAPTCHA o Computer forensics o CAN-SPAM Act o Cyberespionag e o Cyberterroris m o Data Breach o DHS o DDoS Attack o Exploit o Firewall o Hacktivist o Identity Theft o IDS o Logic bomb o MSSP o NGFW o Phishing o Ransomware o Reasonable Assurance o Risk Assessment o Rootkit o Security Audit o Security Policy o Smishing o SPAM o Spear-phishing o Trojan horse o US-CERT o Virus
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
o Virus signature o Vishing o Worm o Zero-Day Attack o Zombie What are the reasons given in the textbook behind why computer incidents are so prevalent? Where do the biggest threats to IT security come from? Where did they previously come from? What are the advantages and disadvantages of BYOD as a business policy? Know the different types of perpetrators of computer crime and what the definition is of each What are the benefits of launching an email campaign as compared to a direct- mail campaign? What are the symptoms of a rootkit infection? What can you do to resolve it? Know the five phases (and what happens in each) of an APT attack. What is the general goal of this type of attack? What are the techniques for security credit cards when used online? Know what the USA Patriot Act is and what subject area it covers What is the SANS Institute? What benefits does SANS provide for a company? What is the goal of risk assessment? What do the terms ‘asset’ and ‘loss event’ refer to in this context? What are the steps given for a general security risk assessment process? Are the ‘how’ details included in a security policy? What does a security policy outline? What are the layers of protective measures that the textbook defines to prevent a possible attack? What is the difference between a typical firewall and a next-generation firewall? What are the popular vendors of firewall software? What are the two most widely used antivirus software products? What is the difference between knowledge-based and behavior-based intrusion detection? What are the steps to respond after a successful attack? What is the primary goal? What are the key elements of a formal incident report? What are the various reasons that a computer forensics investigation might be opened?