MIS 301 Study Guide - Final Guide: Information Security, Business Intelligence, Long Tail

40 views2 pages

Document Summary

Ex: hacker is manager of database system false. Cas: conceptual question moving & coming up w/patterns. Ex: if you are operating a business on internet, ways to. Internet constantly evolving, individual parts that are exploit cas exploit long tail: project mgmt creating & designing a is (goal, software project mgmt. Phased approach requirements gathering phases, analysis (cid:498)house(cid:499) metaphor. Pmi go to & look at phased approach. Link is in slides phase, design, test/simulation phase. Know phases (what they are & major components). If you go into consulting, you get this certification: how requirements are gathered. Supply chain mgmt: where you get materials for product, how you put them together to develop product, input/output, distribution chain, do you have a retail storefront, how does product ultimately touch your customer. Focus groups, observation, hard analytics, click-through data, business. External what kind of data analytics from customers. Data about whatever your data is product access data, financial number data, etc.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers