Operation databases, purchased data, and social data are acquired and then combined to create a .... correct answers Business intelligence application
Processing and summarizing (after the fact) correct answers Reporting
Digging for additional data, beginning to draw assumptions correct answe...
ISM 310 FINAL || with Complete Solutions.
Operation databases, purchased data, and social data are acquired and then combined to create
a .... correct answers Business intelligence application
Processing and summarizing (after the fact) correct answers Reporting
Digging for additional data, beginning to draw assumptions correct answers Data Mining
Looking at the big picture of data, determining what data is valuable information, also making
assumptions that are much farther reaching correct answers Big data
Right data at the right time correct answers Business intelligent system
The three primary activities in a business intelligence process are... correct answers 1. Acquire
Data
2. Analyze
3. Publish Results
Getting rid of irrelevant data, making a raw form more useful correct answers Cleanse data
What is the difference between a push report and a pull report? correct answers A push report
automatically happens and a pull report occurs when questions are asked
Someone who builds a profile based on purchases and sells the data as well correct answers Data
Broker/Aggregator
Amount of detail is too fine or not fine enough correct answers Wrong granularity
What is the difference between supervised and unsupervised data mining? correct answers
Supervised means you already have a theory and you are trying to prove it. Unsupervised means
we don't have theories and are looking for a clustering point.
Rating our customers against one another to see who our top 25% of customers are then rating
them on a score from 1-5. correct answers RFM Analysis
What does RFM stand for? correct answers Recently, Frequently, Money
Looking at cross-selling opportunities (ex: video game section selling snacks based on combined
sales of video games and snacks), Products customers tend to buy together. correct answers
Market Basket Analysis
Group people based on true false there can't be somewhere in between, good for weeding
through general public. correct answers Decision Trees
, Invasion of privacy, digging into someones person life, not accurate information about an
individual, may not be relevant to the situation. correct answers Ethic concerns about data
mining
Forcing people in to certain groups instead of creating a new group. correct answers Overfitting
Have data that is now useful information(create meaningful info from disparate data sources),
Deliver information to user on time. Summarizing our own data NOT creating new data. correct
answers Reporting systems
Always user-defined, can be a home page on the login of a computer. Set these up customizable
for an individual. correct answers Digital Dashboard
Virus, Environmental factors/Natural Disasters, Disgruntled employees/malicious insiders,
hackers are examples of what? correct answers Threats
What is a weakness in your system? correct answers A vulnerability
Firewall, passwords, locking in car are examples of what? correct answers Safeguards
Overflowing a service with so much traffic that it can handle it and weakens the system and
makes it vulnerable. Cannot access things. Ex: Full parking lot correct answers Denial of Service
(DoS)
Small breaches instead of a massive breach correct answers Advanced Persistent Threat
Trail that you leave when your browse the internet correct answers Browser Cookies
Using a fake site to steal people's information such as login or personal when the individual
clicks on the link correct answers Phishing
Seeing what someone's agenda and putting a fear into someone to buy anti-virus software. can be
skewed, use security safeguards such as passwords and correct anti virus software. correct
answers Problems with survey data
Identification and authorization, Encryption, Firewalls, Malware protection, Application design
are examples of? correct answers Technical Safeguards (Hardware software)
Data rights and responsibilities, Passwords, Encryption, Backup and Recovery, Physical security
are examples of? correct answers Data Safeguards (Data)
Hiring, training, education, procedure design, admin, assessment. (Hire good people) are
examples of? correct answers Human Safeguards (Procedures and People)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.79. You're not tied to anything after your purchase.