Unformatted text preview:

ISM 3003 Final Exam Short Answer Questions Chapter 4 1 Decision Making Phases Intelligence Find what to Fix 1 2 Design Find Fixes 3 Choice Pick a Fix 4 Implementation Apply the Fix 2 Four Main Types of Decisions 1 Structured Decision 2 Nonstructured Decision 3 Recurring Decision 4 Nonrecurring Ad Hoc Decision 3 Components of a DSS 1 User Interface Management Component 2 Data Management Component 3 Model Management Component 4 Geographic Information System GIS Designed to Analyze Spatial Information Any Information that can be shown in Map Form o Roads o Distribution of the Bald Eagle Population o Sewer Systems o Path of a Hurricane 5 Intelligence Related Tasks for Data Mining Tools 1 Association or Dependency Modeling 2 Clustering 3 Classification 4 Regression 5 Summarization 6 Predictive Analysis Highly computational Data Mining Technology that uses Information and Business Intelligence to build a Predictive Model for a given Business Application 7 Predictive Goal The Question you want addressed by the Predictive Analytics Model Predictive Indicators The Predictive Analytics engine will use many pieces of information from which it will develop a set of Predictive Indicators that produce the best model 8 Text Analytics The process of using Statistical Artificial Intelligence and Linguistic Technologies to convert information in textual sources surveys emails blogs and social media into structured information 9 Expert System Used for Diagnostic and Prescriptive Problems Diagnostic Problems What s wrong Prescriptive Problems What to do 10 Neural Network Solves problems that require Finding and Differentiating Patterns Bomb Detection Systems Real Estate Appraisal Identify Malfunctioning Machinery 11 Fuzzy Logic s Importance to Text Analytics Assigns numerical values to comment data on a Survey form Fuzzy Logic is Good at Disambiguation The ability to specifically identify a named entity recognition based on surrounding text 12 Agent Based Technology A small piece of software that acts on your behalf to perform tasks assigned to it Also referred to as a Software Agent 13 Biomimicry and Swarm Intelligence are both Multi Agent Systems Chapter 5 1 Electronic Commerce e commerce Commerce that is accelerated and enhanced by IT in particular the Internet 2 Business to Business B2B e marketplaces are Efficient at Creating Supply Chain Management Systems Driving out Costs Creating Information Partnerships with other Businesses Collaborating with other Businesses on new Products and Services 3 Convenience Merchandise and Specialty Merchandise differs on the basis of Price and Customers Frequency of Purchase Convenience Lower Prices More Frequent Purchases Specialty Higher Prices Less Frequent Purchases 4 Commoditylike Items and Digital Items sell well in a B2C e commerce business model because Internal Costs are Minimized Digital Items Shipping Costs are Eliminated because the Digital product is delivered over the Internet 5 Mass Customization The ability of an organization to give its customers the opportunity to tailor its product or service to the customer s specifications 6 Reverse Auction The Buyer posts its interest in buying a certain quantity of items with notations concerning Quality Specification and Delivery Timing and Sellers compete for the business by submitting excessively lower bids 7 Horizontal e marketplace Connects Buyers Sellers in MANY Industries Vertical e marketplace Connects Buyers Sellers in a SPECIFIC Industry 8 Marketing Mix in a B2C e commerce Business Includes Registering with Search Engines Online Ads Viral Marketing Affiliate Programs Social Media 9 Business to Consumer B2C Payment Systems Financial Cybermediary Electronic Check Electronic Bill Presentment and Payment EBPP Smart Card 10 Client Side Digital Wallet Digital Wallet that you can create and keep on your computer It can then be used at a variety of e commerce web sites Server Side Digital Wallet Digital Wallet that an organization creates for you and about you and maintains on its server 11 Secure Sockets Layer SSL Creates a Secure Connection between a client computer and a server computer Secure Electronic SET Creates a Secure and Legitimate Connection between a client computer and a server computer SSL and SET both Encrypt Information before sending it over the Internet Chapter 6 1 People Involved in the Systems Development Process IT Specialists with Organization 1 2 Knowledge Workers 3 Another Organization 2 Systems Development Life Cycle SDLC A structured step by step approach for developing Information Systems 3 Scope Creep Occurs when the scope of the project increases beyond its original intentions Feature Creep Occurs when developers and end users add extra features that were not part of the initial requirements 4 The Four Implementation Methods 1 Parallel Implementation Uses both Old and New Systems 2 Plunge Implementation Discards the Old System and immediately uses the New System 3 Pilot Implementation Only a small group of people start using the New System 4 Phased Implementation Installs the New System in phases 5 Component Based Development CBD A general approach to systems development that focuses on building small self contained blocks of code components that can be reused across a variety of applications 6 The Services within the Service Oriented Architecture SOA are exactly the same as Components in any of the Component Based Development methodologies 7 Why do Organizations Prototypes Encourages Active End User Participation Helps Resolve Discrepancies Among End Users Gives End Users a Feel for the Final System Helps Determine Technical Feasibility Helps Sell Idea of a Proposed System 8 Advantages of Selfsourcing Improves Requirements Determination Increases End User Participation and Sense of Ownership Increases Speed of Systems Development Reduces the Invisible Backlog 9 Proof of Concept Prototype Prototype used to prove the Technical Feasibility of a proposed System Selling Prototype Prototype used to convince people of the Worth of a proposed system 10 When an organization begins Outsourcing they will need to enter into a Service Level Agreement which is a legal and binding contract that explicitly states Features of Proposed System Exact System Costs Time Frame for Development Acceptance Criteria Criteria for Breaking the Contract Metrics for Postdevelopment Activities 11 Geopolitical Outsourcing Options 1 Onshore Outsourcing 2 Nearshore Outsourcing 3 Offshore Outsourcing


View Full Document

FSU ISM 3003 - Final Exam Short-Answer Questions

Documents in this Course
Load more
Download Final Exam Short-Answer Questions
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Final Exam Short-Answer Questions and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Final Exam Short-Answer Questions and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?