MIS EXAM PREP WITH COMPLETE
SOLUTION
Business Analytics - =Extensive use of data and quantitative analysis to support face-based
decision making within organizations.
Business Intelligence - =Includes a wide range of applications, practices, and technologies for
the extraction, transformation, integration, visualization, analysis interpretation, and
presentation of data to support improved decision making.
Data Scientist - =Individuals who have:
1. strong business background and experience.
2. healthy appreciation of limitations of their data, tools and techniques
3. Deep understanding of analytics.
Online Analytical Processing (OLAP) Analytic Tool - =Method to analyze multidimensional data
from many different perspectives. Shows trends in and opportunities in businesses.
Data Cubes - =Container numeric facts called measures, which are categorized by dimensions
such as time and geography.
Data Mining (Analytic Tool) - =Used to explore large amounts of data for hidden patterns to
predict future trends and behaviors for use in decision making.
Association Analysis (Data Mining) - =specialized set of algorithms sorts through data and forms
statistical rules about relationships among the items
Case-Based Reasoning (Data Mining) - =Historical if-then-else cases are used to recognize
patterns
,Data Visualization (Analytic Tool) - =Presentation of data in pictorial or graphical format. Brings
dull and boring numbers into interesting visuals.
TagCrowd & Word Cloud - =Visual deception of words that have been grouped together
because of their frequency of occurrence.
Conversion Funnel - =Graphical Representation that summarizes steps a consumer takes in
making a decision to buy a product.
Linear Regression (Analytic Tool) - =Mathematical technique for predicting the value of a
dependent variable based on a single independent variable.
Dashboards (Analytic Tool) - =Measures metrics that track progress in executing chosen
strategies to attain organizational objects and goals.
Balanced Scorecard - =sets goals, measures, and targets for certain departments.
Key Performance Indicators (KPIs) - =Organization measure performance of organization.
Consists of objective, measure, target, and time frame.
Spreadsheets (Analytic Tool) - =Data based on formulas to create reports and graphs on data.
What-if Analysis - =Analysis to evaluate various alternatives to a problem.
Computer Mistakes - =Errors
Failures
Causes of Computer Mistakes - =1. Unclear expectations
2. Inadequate training
,3. Program development errors
4. Incorrect input by clerk
Preventing Computer-related mistakes - =1. Establishing
2. Implementing
3. Monitoring
4. Reviewing
of policies and procedures
Key factors in procedures - =1. Good training programs.
2. All new applications are approved.
3. Documents of applications be filed to a central office for authorization.
4. System controls for invalid input (input, output, and security controls)
Meaning of Monitoring policies and prodcedures - =Implement internal audits to measure
actual results against goals. Audits track time employees spend on non-work -related web sites.
E-Government act of 2002 - =Requires federal agencies to post privacy policies on their website.
RFID Tags - =microchips under people's skin, or on clothing or car keys for tracking.
Occupational Stress - =anxieties about job insecurity, loss of control, incompetence.
SIT (seated immobility thromboembolism) - =formation of blood clots in the legs or lungs
RSI (repetitive strain injury) - =injury or disorder of the muscles, nerves, tendons, ligaments, or
joints caused by repetitive motion.
, CTS (carpal tunnel syndrome) - =inflammation of the nerve that connects the forearm to the
palm of the wrist.
Code of Ethics - =States the principles and core values essential to a set of people, and
therefore, govern their behavior. Can be a reference point for weighing what is legal and
ethical.
Privacy - =The right to be left alone or to be withdrawn from public view.
BYOD (bring your own device) - =business policy that permits employees to use their own
mobile devices to access company computing resources and applications.
Types of Security Threats - =Ransomware, viruses, worms, trojan horses, blended threat, spam,
phishing, spear-phishing, smishing, vishing, identity theft, cyberspionage
Ransomware - =malware that stops you from using your computer and asks for demands before
letting you use your computer again.
Virus - =piece of code that causes computer to behave in an unexpected manner.
Worms - =harmful program that resides in active memory and duplicates itself. Can spread
without intervention.
Trojan Horse - =seemingly harmless program in which malicious code is hidden. Creates a
"backdoor" on computer enabling attack gain future access.
Blended Threat - =Combination of virus, worm, trojan horse, and other bad codes.
Spam - =Use of email system to send unsolicited email to large numbers of people.
SOLUTION
Business Analytics - =Extensive use of data and quantitative analysis to support face-based
decision making within organizations.
Business Intelligence - =Includes a wide range of applications, practices, and technologies for
the extraction, transformation, integration, visualization, analysis interpretation, and
presentation of data to support improved decision making.
Data Scientist - =Individuals who have:
1. strong business background and experience.
2. healthy appreciation of limitations of their data, tools and techniques
3. Deep understanding of analytics.
Online Analytical Processing (OLAP) Analytic Tool - =Method to analyze multidimensional data
from many different perspectives. Shows trends in and opportunities in businesses.
Data Cubes - =Container numeric facts called measures, which are categorized by dimensions
such as time and geography.
Data Mining (Analytic Tool) - =Used to explore large amounts of data for hidden patterns to
predict future trends and behaviors for use in decision making.
Association Analysis (Data Mining) - =specialized set of algorithms sorts through data and forms
statistical rules about relationships among the items
Case-Based Reasoning (Data Mining) - =Historical if-then-else cases are used to recognize
patterns
,Data Visualization (Analytic Tool) - =Presentation of data in pictorial or graphical format. Brings
dull and boring numbers into interesting visuals.
TagCrowd & Word Cloud - =Visual deception of words that have been grouped together
because of their frequency of occurrence.
Conversion Funnel - =Graphical Representation that summarizes steps a consumer takes in
making a decision to buy a product.
Linear Regression (Analytic Tool) - =Mathematical technique for predicting the value of a
dependent variable based on a single independent variable.
Dashboards (Analytic Tool) - =Measures metrics that track progress in executing chosen
strategies to attain organizational objects and goals.
Balanced Scorecard - =sets goals, measures, and targets for certain departments.
Key Performance Indicators (KPIs) - =Organization measure performance of organization.
Consists of objective, measure, target, and time frame.
Spreadsheets (Analytic Tool) - =Data based on formulas to create reports and graphs on data.
What-if Analysis - =Analysis to evaluate various alternatives to a problem.
Computer Mistakes - =Errors
Failures
Causes of Computer Mistakes - =1. Unclear expectations
2. Inadequate training
,3. Program development errors
4. Incorrect input by clerk
Preventing Computer-related mistakes - =1. Establishing
2. Implementing
3. Monitoring
4. Reviewing
of policies and procedures
Key factors in procedures - =1. Good training programs.
2. All new applications are approved.
3. Documents of applications be filed to a central office for authorization.
4. System controls for invalid input (input, output, and security controls)
Meaning of Monitoring policies and prodcedures - =Implement internal audits to measure
actual results against goals. Audits track time employees spend on non-work -related web sites.
E-Government act of 2002 - =Requires federal agencies to post privacy policies on their website.
RFID Tags - =microchips under people's skin, or on clothing or car keys for tracking.
Occupational Stress - =anxieties about job insecurity, loss of control, incompetence.
SIT (seated immobility thromboembolism) - =formation of blood clots in the legs or lungs
RSI (repetitive strain injury) - =injury or disorder of the muscles, nerves, tendons, ligaments, or
joints caused by repetitive motion.
, CTS (carpal tunnel syndrome) - =inflammation of the nerve that connects the forearm to the
palm of the wrist.
Code of Ethics - =States the principles and core values essential to a set of people, and
therefore, govern their behavior. Can be a reference point for weighing what is legal and
ethical.
Privacy - =The right to be left alone or to be withdrawn from public view.
BYOD (bring your own device) - =business policy that permits employees to use their own
mobile devices to access company computing resources and applications.
Types of Security Threats - =Ransomware, viruses, worms, trojan horses, blended threat, spam,
phishing, spear-phishing, smishing, vishing, identity theft, cyberspionage
Ransomware - =malware that stops you from using your computer and asks for demands before
letting you use your computer again.
Virus - =piece of code that causes computer to behave in an unexpected manner.
Worms - =harmful program that resides in active memory and duplicates itself. Can spread
without intervention.
Trojan Horse - =seemingly harmless program in which malicious code is hidden. Creates a
"backdoor" on computer enabling attack gain future access.
Blended Threat - =Combination of virus, worm, trojan horse, and other bad codes.
Spam - =Use of email system to send unsolicited email to large numbers of people.