CIS Final topics
- 4 questions about personal information systems
- pas, sis eis, ees
- enter enterprise information system
- information silout
- whats a mash up
- viral hook
- what does each department do
- what support do thy provide
- projects posed by information silos
- business process management vs business process engineering
- outsourcing
- enter operability
- erp and inherent processes
- all the phases of customer life cycle
- relationship managment
- components of relationship management
- definition of an ERP
- WHY do we implement ERP systems
- whats an SAP
- what is the difference between ERP vs CRM vs EAI
- Learn about the risks and expenses and issues associated with the enterprise system
- what is data warehousing
- what is cloud computing
- what is social media
- what is EDI ( electronic document interchange)
- who are the parties involved with social media
- who are the sponsors or application provider
- what is SMIS
- learn about the user community
- the defender of the belief and the seeker of the truth
- slate - the characteristics of enterprise 2.0
- folksonomy
- what are the problems of social networking
- how to respond to these problems
- what is a BI system
- what are the activities in the BI process
- what is the difference between pull and push report
- what is data mining
- what is data acquisition
- what is meta data
- what is data granularity
- what is data mart vs data warehouse
- what is the difference between structured dat vs unstructutured data
- what is big data
- data mining is an important concept
- static report vs dynamic reports
- exception report
- what is the difference between supervised and unsupervised data mining technique
- what is regression analysis vs cluster analysis
- map reduce process of big data
- hadoop - open source program
- use to process big data
- what is linux
- system development vs program development
- what are the phases of system development
- definition of an information system
- what is the difference between of the shelf software and tailored software
- what is brookes law
- what is feasibility study
- what is the difference between technical and organizational and cost feasibility
- cycles of an sdlc ( system development life cycle)
- what is the difference between
- what is data model
- what is prototype
- what are the concerns when developers are using prototypes
- what is the difference between normal and backup processing procedures
- what is the different types of testing
- integration vs beta testing vs unit testing
- what is the role of a system analyst
- what does a system analyst do
- what are the types of conversion
- parallel, pilot and phase conversion vs plunge
- what is analysis paralysis
- what is the role of a development group of an IS department
- whats the role of a network administrator
- what is alignment
- what are the advantages of outsourcing information systems
- what are the risks of outsourcing
- what is the difference between SAAS vs PAAS vs IAAS
- what is your responsibility of a user of an information system
- what is the difference between hacking, pretexting, phishing ,email spoofing
- driveby snifer
- hackers phishers and driveby snifers
- DOS attack
- what is encryption
- whats an intrusion detection system
- whats a brute force attack
- whats an encryption key
- what are the different types of security
- the difference between technical safeguard, human safeguard
- the process of authenticating a user
- what is a smart cart
- what is bio metric authentication
- the difference between http and https
- what are the different layers of firewalls
- filtering and application and internal firewalls
- what is malware
- what is the difference between adware, spyware and payloads and what is a trojan horse
- how should employees react to security problems
- what is an incident response plan
Comments
Post a Comment