100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISA235 – Final Exam Study Guide – Key Concepts and Definitions

Beoordeling
-
Verkocht
-
Pagina's
40
Cijfer
A+
Geüpload op
06-12-2025
Geschreven in
2025/2026

Value Chain - correct answer The technique used to execute the business strategy Value Chain Primary - correct answer Business processes that acquire raw materials and manufacture, deliver, market, sell, and provide after sale services Value Chain Support - correct answer Business processes, such as film infrastructure, human resource management, technology development, and procurement, that support the primary value activities Data - correct answer Raw facts that describe the characteristics of an event or object Information - correct answer Data converted into a meaningful and useful context Internet of Things - correct answer A world where interconnected, Internet-enabled devices or things can collect and share data without human intervention, Refers to a network of connected devices that communicate and share data over the internet Business Intelligence - correct answer Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationships for strategic decision

Meer zien Lees minder
Instelling
ISA235
Vak
ISA235











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ISA235
Vak
ISA235

Documentinformatie

Geüpload op
6 december 2025
Aantal pagina's
40
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ISA235 – Final Exam Study Guide – Key Concepts and Definitions
Value Chain - correct answer The technique used to execute the business strategy
Value Chain Primary - correct answer Business processes that acquire raw materials and
manufacture, deliver, market, sell, and provide after sale services
Value Chain Support - correct answer Business processes, such as film infrastructure, human
resource management, technology development, and procurement, that support the primary
value activities
Data - correct answer Raw facts that describe the characteristics of an event or object
Information - correct answer Data converted into a meaningful and useful context
Internet of Things - correct answer A world where interconnected, Internet-enabled devices or
things can collect and share data without human intervention, Refers to a network of
connected devices that communicate and share data over the internet
Business Intelligence - correct answer Information collected from multiple sources such as
suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and
relationships for strategic decision making
Analytics/Business Analytics - correct answer The science of fact-based decision making ; The
scientific process of transforming data into insight for making better decisions
Knowledge - correct answer Skills, experience, and expertise coupled with information and
intelligence that creates a persons intellectual resources
System - correct answer A collection of parts that link to achieve a common purpose
Systems Thinking - correct answer A way of monitoring the entire system by viewing multiple
inputs being processed or transformed to produce outputs while continuously gathering
feedback on each part
Porter's Five Forces Model (way to discern comp. landscape) - correct answer Analyzes the
competitive forces within the environment in which a company operates to assess the potential
for profitability in an industry
Big Data - correct answer A collection of large, complex data sets, including structured and
unstructured data, which cannot be analyzed using traditional database methods and tools
SWOT Analysis - correct answer Evaluates an organization's strengths, weaknesses,
opportunities, and threats to identify significant influences that work for or against business
strategies

,Data Silo - correct answer Occurs when one business unit is unable to freely communicate with
other business units, making it difficult or impossible for organizations to work cross-
functionally
Metrics - correct answer Measurements that evaluate results to determine whether a project is
meeting goals
Machine Learning - correct answer A type of artificial intelligence that enables computers to
both understand concepts in the environment and to learn
Robotic Process Automation (RPA) - correct answer The use of software with artificial
intelligence and machine learning capabilities to handle high-volume, repeatable tasks that
previously required a human to perform
Business Process - correct answer A standardized set of activities that accomplish a specific
task, such as processing a customer's order
Granularity - correct answer Refers to the level of detail in the model or the decision-making
process
Visualization - correct answer Produces graphical displays of patterns and complex
relationships in large amounts of data
Artificial Intelligence - correct answer Simulates human thinking and behavior, such as the
ability to reason and learn
Business Process Modeling (BPMN) - correct answer A graphical notation that depicts the steps
in a business process
Business Process Reengineering - correct answer The analysis and redesign of workflow within
and between enterprises
Best Practices - correct answer The most successful solutions or problem-solving methods that
have been developed by a specific organization or industry. Measuring MIS projects helps
determine that best practices for an industry
Business Process Automation - correct answer The process of computerizing manual tasks,
making them more efficient and effective, and dramatically lowering operational costs
Business Process Streamlining - correct answer Improves business process efficiencies by
simplifying or eliminating unnecessary steps
Algorithms - correct answer Mathematical formulas placed in software that perform an analysis
on a dataset
Key Performance Indicator - correct answer The quantifiable metrics a company uses to
evaluate progress toward critical success factors. KPIs are far more specific than CSFs

,Critical Success Factors - correct answer The crucial steps companies perform to achieve their
goals and objectives and implement their strategies
Disruptive Technology - correct answer A new way of doing things that initially does not meet
the needs of existing customers
Sustaining Technology - correct answer Produces an improved product customers are eager to
buy, such as a faster car or larger hard drive
Internet - correct answer A massive network that connects computers all over the world and
allows them to communicate with one another
Web (Business) 1.0 - correct answer A term to refer to the World Wide Web during its first few
years of operation between 1991 and 2003
Ecommerce - correct answer The buying and selling of goods and services over the Internet.
Ecommerce refers only to online transactions
Ebusiness - correct answer Includes ECommerce along with all activities related to internal and
external business operations, such as servicing customer accounts, collaborating with partners,
and exchanging real-time information. During Web 1.0, entrepreneurs began creating the first
forms of ebusiness
Clickstream Analytics - correct answer The process of collecting, analyzing, and reporting
aggregate data which pages a website visitor visits and in what order
Disintermediation - correct answer Occurs when a business sells directly to the customer online
and cuts out the intermediary
Semantic Web - correct answer A component of Web 3.0 that describes things in a way that
computers can understand
Search Engine Optimization - correct answer Combines art with science to determine how to
make URLs more attractive to search engines, resulting in higher search engine ranking.
User-contributed Content - correct answer Created and updated by many users for many users
Web (Business) 2.0 - correct answer The next generation of Internet use - a more mature,
distinctive communications platform characterized by new qualities such as collaboration,
sharing, and being free
Web (Business) 3.0 - correct answer Based on "intelligent" web applications using natural
language processing, machine-based learning and reasoning, and intelligent applications
Source Code - correct answer Contains instructions written by a programmer specifying the
actions to be performed by computer software

, Open Source - correct answer Refers to any software whose source code is made available free
(not on a fee or licensing basis, as in ebusiness) for any third party to review and modify
Closed Source - correct answer Any proprietary software licensed under exclusive legal right of
the copyright holder
Domain Name System (DNS) - correct answer A series of databases that keeps track of every
computer name and IP address on the Internet
Spoofing - correct answer Is the forging of the return address on an email so that the message
appears to come from someone other than the actual sender. This is not a virus but rather a
way by which virus authors conceal their identities as they send out viruses
Malicious Code - correct answer Includes a variety of threats such as viruses, worms, and Trojan
horses
Packet Tampering - correct answer Consists of altering the contents of packets as they travel
over the internet or altering data on computer disks after penetrating a network. For example,
an attacker might place a tap on a network line to intercept packets as they leave the
computer. The attacker could eavesdrop or alter the information as it leaves the network
Denial of Service - correct answer From multiple computers floods a website with so many
requests for service that it slows down or crashes. A common type is the Ping of Death, in which
thousands of computers try to access a website at the same time, overloading it and shutting it
down
Ransomware - correct answer A form of malicious software that infects your computer and asks
for money
Information Security - correct answer Details how an organization will implement the new
information security policies/Identify the rules required to maintain information security, such
as requiring users to log off before leaving for lunch or meetings, never sharing passwords with
anyone, and changing passwords every 30 days
Common Forms of Viruses (Worm > & Denial of Service) - correct answer Spreads itself not only
from file to file but also from computer to computer
Hacker - correct answer Experts in technology who use their knowledge to break into
computers and computer networks, either for profit or just motivated by the challenge
Network Behavior Analysis - correct answer Gathers an organization's computer network traffic
patterns to identify unusual or suspicious operations
Cyberattacks - correct answer Malicious attempts to access or damage a computer system.
Cyberattacks have the following attributes: Use computers, mobile phones, gaming systems,

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
atiexpert A.T. Still University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
378
Lid sinds
3 jaar
Aantal volgers
270
Documenten
4068
Laatst verkocht
1 week geleden
@Nclex

SPECIALIZED ON; ####@NCLEX..........QA################################## [LATEST UPDATE 2022/2023 .ALL NCLEX EXAM AVAILABLE .HESI LATEST .ATI 100% CORRECT AND ALL RELATED HESI,NCLEX AND ATI TESTBANK ,BUNDLES AND FLASHCARDS]

3,9

63 beoordelingen

5
31
4
13
3
7
2
3
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen