MIS 301 Study Guide - Final Guide: Information Security, Business Intelligence, Long Tail
Document Summary
Ex: hacker is manager of database system false. Cas: conceptual question moving & coming up w/patterns. Ex: if you are operating a business on internet, ways to. Internet constantly evolving, individual parts that are exploit cas exploit long tail: project mgmt creating & designing a is (goal, software project mgmt. Phased approach requirements gathering phases, analysis (cid:498)house(cid:499) metaphor. Pmi go to & look at phased approach. Link is in slides phase, design, test/simulation phase. Know phases (what they are & major components). If you go into consulting, you get this certification: how requirements are gathered. Supply chain mgmt: where you get materials for product, how you put them together to develop product, input/output, distribution chain, do you have a retail storefront, how does product ultimately touch your customer. Focus groups, observation, hard analytics, click-through data, business. External what kind of data analytics from customers. Data about whatever your data is product access data, financial number data, etc.