Abbreviated DSS, the term refers to an interactive computerized system that gathers and presents data from a wide range of sources, typically for business purposes. DSS applications are systems and subsystems that help people make decisions based on data that is culled from a wide range of sources.
For example: a national on-line book seller wants to begin selling its products internationally but first needs to determine if that will be a wise business decision. The vendor can use a DSS to gather information from its own resources (using a tool such as OLAP) to determine if the company has the ability or potential ability to expand its business and also from external resources, such as industry data, to determine if there is indeed a demand to meet. The DSS will collect and analyze the data and then present it in a way that can be interpreted by humans. Some decision support systems come very close to acting as artificial intelligence agents.
DSS applications are not single information resources, such as a database or a program that graphically represents sales figures, but the combination of integrated resources working together.
Reference: http://www.webopedia.com/TERM/D/decision_support_system.html
skip to main |
skip to sidebar
Tuesday, March 15, 2011
About Me
- ★7★
- Group Member:
CHUA HOOI KANG
DING TAI CHEAN
ONG BAN HOCK
PEE KOK CHOON
YU YANG
Counter
Blog Archive
-
▼
2011
(53)
-
▼
March
(32)
- Iranian hacker claims credit for SSL certificate t...
- Forget Social Security numbers -- cyber criminals ...
- McAfee's website full of security holes, researche...
- Amazon's cloud new offers dedicated hardware
- Java founder Gosling joins Google
- Analysis: How MySQL.com and Sun.com got hacked
- Yahoo to release code for selected technologies to...
- Top 10 presentation tool
- Mozilla: A new Firefox every 16 weeks
- Experts see wide use of flash-hard disk hybrids by...
- EMC: RSA SecurID info swiped via sophisticated hac...
- Executive Support System
- What is decision support system
- MIS
- Transaction Processing System
- New attacks leverage unpatched IE flaw, Microsoft ...
- Window Defender
- Kaspersky Internet Security 2011 Wins Top Marks fo...
- A short story about Microsoft Word 2010 Part
- Malware in February: Cybercriminals Perfect Drive-...
- A short story about Microsoft Word 2010 Part 3
- A short story about Microsoft Word 2010 Part 2
- A short story about Microsoft Word 2010 Part 1
- Find trojan horse virus on PC
- Q&A: What is DRM?
- 10 Tips for Creating Secure Passwords
- Computer Virus
- Different Kinds of Biometric Devices
- Five Best File Compression Tools
- Who Drove The First Floppy Disk Drive
- Top 7 Advanced Illustration Programs
- Hard disk buying guide
-
▼
March
(32)
Labels
- Chapter 1 (2)
- Chapter 10 (7)
- Chapter 11 (4)
- Chapter 12 (1)
- Chapter 13 (1)
- Chapter 14 (1)
- Chapter 15 (2)
- Chapter 2 (4)
- Chapter 3 (5)
- Chapter 4 (2)
- Chapter 5 (2)
- Chapter 6 (2)
- Chapter 7 (2)
- Chapter 8 (3)
- Chapter3 (1)
- News (12)
- Other (2)
Powered by Blogger.
Chat Room
Pet
Try us on Wibiya!
0 comments:
Post a Comment