CIS Final topics


  • 4 questions about personal information systems 
  • pas, sis eis, ees 
  • enter enterprise information system 
  • information silout 
  • whats a mash up 
  • viral hook 
  • what does each department do 
    • what support do thy provide 
  • projects posed by information silos 
  • business process management vs business process engineering 
  • outsourcing 
  • enter operability 
  • erp and inherent processes 
  • all the phases of customer life cycle 
  • relationship managment 
  • components of relationship management 
  • definition of an ERP 
  • WHY do we implement ERP systems 
  • whats an SAP 
  • what is the difference between ERP vs CRM vs EAI
  • Learn about the risks and expenses and issues associated with the enterprise system
  • what is data warehousing 
  • what is cloud computing 
  • what is social media 
  • what is EDI ( electronic document interchange) 
  • who are the parties involved with social media 
  • who are the sponsors or application provider 
  •   what is SMIS 
  • learn about the user community 
  • the defender of the belief and the seeker of the truth 
  • slate - the characteristics of enterprise 2.0 
  • folksonomy
  • what are the problems of social networking 
  • how to respond to these problems 
  • what is a BI system 
  • what are the activities in the BI process 
  • what is the difference between pull and push report 
  • what is data mining 
  • what is data acquisition 
  • what is meta data 
  • what is data granularity 
  • what is data mart vs data warehouse 
  • what is the difference between structured dat vs unstructutured data 
  • what is big data 
  • data mining is an important concept 
  • static report vs dynamic reports 
  • exception report 
  • what is the difference between supervised and unsupervised data mining technique 
  • what is regression analysis vs cluster analysis 
  • map reduce process of big data 
  • hadoop - open source program
    • use to process big data 
  • what is linux 
  • system development vs program development 
  • what are the phases of system development 
  • definition of an information system 
  • what is the difference between of the shelf software and tailored software 
  • what is brookes law 
  • what is feasibility study 
  • what is the difference between technical and organizational and cost feasibility 
  • cycles of an sdlc ( system development life cycle) 
  • what is the difference between 
  • what is data model 
  • what is prototype 
  • what are the concerns when developers are using prototypes 
  • what is the difference between normal and backup processing procedures 
  • what is the different types of testing 
  • integration vs beta testing vs unit testing 
  • what is the role of a system analyst 
  • what does a system analyst do 
  • what are the types of conversion 
  • parallel, pilot and phase conversion vs plunge 
  • what is analysis paralysis 
  • what is the role of a development group of an IS department 
  • whats the role of a network administrator 
  • what is alignment 
  • what are the advantages of outsourcing information systems 
  • what are the risks of outsourcing 
  • what is the difference between SAAS vs PAAS vs IAAS
  •  what is your responsibility of a user of an information system 
  • what is the difference between hacking, pretexting, phishing ,email spoofing 
  • driveby snifer 
  • hackers phishers and driveby snifers 
  • DOS attack 
  • what is encryption
  •  whats an intrusion detection system 
  • whats a brute force attack 
  • whats an encryption key 
  • what are the different types of security 
  • the difference between technical safeguard, human safeguard 
  • the process of authenticating a user 
  • what is a smart cart 
  • what is bio metric authentication 
  • the difference between http and https 
  • what are the different layers of firewalls 
  • filtering and application and internal firewalls 
  • what is malware 
  • what is the difference between adware, spyware and payloads and what is a trojan horse 
  • how should employees react to security problems 
  • what is an incident response plan 

Comments

Popular posts from this blog

database