Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
283 Cards in this Set
- Front
- Back
Moore's Law
|
the cost of data communications and data storage is essentially zero
|
|
Abstract Reasoning
|
the ability to make and manipulate models
|
|
Systems Thinking
|
the ability to model components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed
|
|
Collaboration
|
the activity of two or more people working together to achieve a common goal, result, or work product.
|
|
Experimentation
|
making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have
|
|
System
|
a group of components that interact to achieve some purpose
|
|
Information System (IS)
|
group of components that interact to produce information
|
|
Five-component framework
|
hardware, software, data, procedures, and people
|
|
computer-based information system
|
information system to include a computer
|
|
MIS/Management Information Systems
|
development and use of information systems that help businesses achieve their goals and objectives
|
|
Information Technology (IT)
|
refers to the products, methods, inventions, and standards that are used for the purpose of producing informations
|
|
strong password
|
obvious
|
|
business process
|
network of activities, roles, resources, repositories, and data flows that interact to accomplish a business function
|
|
activities
|
collections of related tasks that receive inputs and process those inputs to produce outputs
|
|
decision
|
question that can be answered Yes or No. Provide branching points within the flow of a business process
|
|
roles
|
sets of procedures
|
|
resources
|
people, facilities, or computer programs that are assigned to roles
|
|
repository
|
a collection of business records. holds the collective memory of the organization
|
|
data flow
|
the movement of a data item from one activity to another activity or to a repository
|
|
information
|
knowledge derived from data, where data is defined as recorded facts or figures
|
|
accurate information
|
information that is based on correct and complete data
|
|
timely information
|
information that is produced in time for its intended use
|
|
relevant information
|
information that directly pertains to both the context and to the subject it references
|
|
Just barely sufficient information
|
information that is sufficient for the purpose for which it is generated, but only so
|
|
worth its cost
|
an appropriate relationship must exist between the cost of information and its value
|
|
Five Forces Model
|
competitive forces: competition from vendors of substitutes, from new competitors, and from existing rivals
bargaining power forces: bargaining power of suppliers and customers |
|
Competitive strategy
|
Industry-wide, cost, differentiation, focus
|
|
value
|
the amount of money that a customer is willing to pay for a resource, product, or service
|
|
margin
|
difference between the value that an activity generates and the cost of the activity
|
|
value chain
|
network of value-creating activities
|
|
primary activities
|
business functions that relate directly to the production of the organization's products or services
|
|
support activities
|
business functions that assist and facilitate the primary activities
|
|
linkages
|
interactions across value activities
|
|
switching costs
|
organizations can lock in customers by making it difficult or expensive for customers to switch to another product
|
|
hardware
|
consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software
|
|
input hardware
|
keyboard, mouse, printer
|
|
central processing unit (cpu)
|
"the brain" of the computer
|
|
dual-processor
|
two cpu's
|
|
quad-processor
|
4 cpu's
|
|
main memory
|
consists of circuitry for storing data and instructions that are acted upon by the CPU
|
|
RAM
|
random access memory
|
|
special function cards
|
electronic components on thin fiberglass backing that can be added to the computer to augment its basic capabilities
|
|
output hardware
|
consists of video displays, printers, audio speakers....
|
|
storage hardware
|
saves data and programs
|
|
binary digits
|
how computers represent data
|
|
bits
|
a zero or a one. used for computer data because they are easy to represent electronically
|
|
bytes
|
8 bits = bytes
|
|
kilobyte (k)
|
1,024 bytes
|
|
megabyte (MB)
|
1,024 K = 1,048,576 bytes
|
|
Gigabyte (GB)
|
1,024 MB = 1,073,741,824 bytes
|
|
Terabyte (TB)
|
1,024 GB = 1,099,511,627,776 bytes
|
|
data channel/bus
|
moves instruction from main memory into CPU
|
|
cache
|
CPU has a small amount of very fast memory
|
|
operating system (OS)
|
a program that controls the computer's resources
|
|
memory swapping
|
if there is not enough memory, it will remove something and then it will place the just-requested program or data into the vacated space
|
|
32-bit CPU
|
processor that can effectively utilize up to 4 GB of main memory
|
|
64-bit CPU
|
a processor that can use, by today's standards, an almost unlimited amount of main memory
|
|
volatile
|
contents are lost when the power is off
|
|
nonvolatile
|
contents survive when the power is off.
|
|
client
|
computers for word processing, spreadsheets, database access, and so forth
|
|
servers
|
provide a service. server is a computer
|
|
server farm
|
collection of servers
|
|
Unix
|
operating system that was developed by Bell Labs
|
|
Linux
|
version of Unix that was developed by the Open Source Community
|
|
Open Source Community
|
a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux
|
|
license
|
the right to use a certain number of copies of that program subject to limits on the vendor's liability
|
|
site license
|
a flat fee payment for the right to install the product on all of that company's computers or on all of the computers at a specific site
|
|
cloud computing
|
a form of hardware/software leasing in which organizations obtain server resources from venors that specialize in server processing
|
|
virtualization
|
process whereby multiple operating systems share the same hardware
|
|
application software
|
performs a service or function
|
|
horizontal-market application
|
software provides capabilities common across all organizations and industries
|
|
vertical-market application
|
software serves the needs of a specific industry
|
|
one-of-a-kind application
|
software is developed for a specific, unique need
|
|
custom-developed software
|
tailor-made software
|
|
firmware
|
computer software that is installed into devices such as printers, print servers, and various types of communication devices
|
|
desktop programs
|
programs that run only on your computer (Word, Excel)
|
|
client-server applications
|
applications that process code on both the client and the server.
|
|
thick-client
|
application program that must be preinstalled on the client
|
|
thin-client
|
runs within a browser and need not be preinstalled
|
|
Source code
|
computer code as written by humans that is understandable by humans
|
|
machine code
|
code processed by a computer
|
|
closed source
|
highly protected source code that is only available to trusted employees and carefully vetted contractors
|
|
database
|
self-describing collection of integrated records
|
|
byte
|
character of data
|
|
columns or fields
|
how bytes are grouped
|
|
rows or records
|
how columns or fields are grouped
|
|
table or file
|
group of similar rows or records
|
|
key
|
column or group of columns that identifies a unique row in a table
|
|
foreign keys
|
what connects two tables together
|
|
relational databases
|
databases that carry their data in the form of tables and that represent relationships using foreign keys
|
|
metadata
|
data that describes data
|
|
database application system
|
assembly of forms, reports, queries, and application programs that process a database
|
|
database management system (DBMS)
|
a program used to create, process, and administer a database
|
|
Structured Query Language (SQL)
|
an international standard language for processing a database
|
|
database application
|
collection of forms, reports, queries, and application programs that process a database
|
|
form
|
used to read, insert, modify, and delete data
|
|
report
|
show data in a structured context
|
|
multiuser processing
|
multiple users processing the database
|
|
lost-update problem
|
exemplifies one of the special characteristics of multiuser database processing
|
|
Enterprise DBMS
|
products process large organizational and workgroup databases
|
|
Personal DBMS
|
used for personal or small workgroup applications that involve fewer than 100 users, and normally fewer than 15
|
|
network
|
a collection of computers that communicate with one another over transmission lines or wirelessly
|
|
local area network (LAN)
|
connects computers that reside in a single geographic location on the premises of the company that operates the LAN
|
|
wide area networks (WAN)
|
connect computers at different geographic locations
|
|
internet
|
network of networks
|
|
the Internet
|
collection of networks that you use when you send email or access a Web site
|
|
protocol
|
set of rules that two communicating devices follow
|
|
Small office or home office
|
SOHO
|
|
switch
|
a special-purpose computer that receives and transmits wired traffic on the LAN
|
|
LAN device
|
contains several important networking components
|
|
Network interface card (NIC)
|
device that connects the computer's or printer's circuitry to the network cables
|
|
onboard NIC
|
NIC built into computer's circuitry
|
|
unshielded twisted pair (UTP) cable
|
contains sets of wires that are twisted together to improve signs quality
|
|
optical fiber cables
|
signals = light rays, they are reflected inside the glass core of the optical fiber cable
|
|
wireless NIC (WNIC)
|
used instead of a NIC
|
|
access point
|
the component of the LAN device that processes wireless traffic and communicates with the wired switch
|
|
IEEE 802.3 protocol (Ethernet)
|
used for wired LAN connections; describes how messages are to be packaged and processed for wired transmission over the LAN
|
|
10/100/1000 Ethernet
|
conform to the 802.3 specification and allows for transmission at a rate of 10, 100, or 1000 Mbps
|
|
IEEE 802.11 protocol
|
wireless LAN connections
|
|
bluetooth
|
designed for transmitting data over short distances, replacing cables
|
|
Internet service provider (ISP)
|
provides a legitimate internet address, servers as gateway to the internet
|
|
modem
|
convers digital data to analog signals
|
|
Digital subscriber line (DSL) modems
|
operate on the same lines as voice telephones, but their signals do not interfere with voice telephone service
|
|
asymmetric digital subscriber lines (ADSL)
|
DSL lines that have different upload and download speeds
|
|
Symmetrical digital subscriber lines (SDSL)
|
meet this need by offering the same fast speed in both directions
|
|
cable modems
|
provide high-speed data transmission using cable television lines
|
|
Cell phone protocols
|
EVDO, HSDPA, WiMax
|
|
narrowband
|
transmission speeds less than 56 kbps
|
|
broadband
|
speeds in excess of 256 kbps
|
|
TCP/IP Protocol architecture
|
a scheme of five protocol types arranged in layers
|
|
Hypertext Transport protocol (HTTP)
|
protocol used between browsers and Web servers f
|
|
HTTPS
|
secure version of HTTP
|
|
Simple Mail Transfer Protocol (SMTP)
|
used for email transmissions
|
|
File Transfer Protocol (FTP)
|
used to move files over the Internet
|
|
Web
|
the Internet-based network of browsers and servers that process HTTP or HTTPS
|
|
Transmission Control Protocol (TCP)
|
breaks traffic up into pieces and send each piece along its way
|
|
IP (internet protocol)
|
specifies the routing of the pieces of your data communication through the networks that comprise any internet
|
|
packet
|
a piece of a message that is handled by programs that implement IP
|
|
router
|
special purpose computer that moves packet traffic according to the rules of IP
|
|
IP address
|
number that identifies a particular device
|
|
Public IP addresses
|
identify a particular device on the public Internet
|
|
ICANN (Internet Corporation for Assigned Names and Number)
|
controls IP addresses
|
|
IPv4
|
four decimal dotted notation like 165.193.123.253
|
|
IPv6
|
longer format
|
|
domain name
|
a unique name that is affiliated with a public IP address
|
|
URL (Uniform Resource Locator)
|
an address on the Intenet
|
|
Three-tier architecture
|
arrangement of user computers and servers into three categories
|
|
user tier
|
consists of computers, phones, and other devices that have browsers that request and process Web pages
|
|
server tier
|
consists of computers that run Web servers and process application programs
|
|
database tier
|
consists of computers that run a DMBS that processes SQl requests to retrieve and store data
|
|
Web page
|
a document that is coded in one of the standard page markup languages
|
|
web servers
|
programs that run on a server tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients
|
|
commerce server
|
application program that runs on a server tier computer
|
|
web form
|
commercial websites usually are supported by several or even many Web server computers in a facility
|
|
Hypertext Markup Language (HTML)
|
is the most common language for defining the structure and layout of web pages
|
|
tag
|
notation used to define a data element for display or other purposes
|
|
hyperlinks
|
pointers to other Web pages
|
|
attribute
|
variable used to provide properties about a tag
|
|
XML (eXtensible Markup Language)
|
a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web
|
|
flash
|
an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser
|
|
Silverlight
|
browser add-on that was developed by Microsoft for the same purposes as Flash
|
|
Virtual Private network (VPN)
|
uses the Internet to create the appearance of private point-to-point connections
|
|
tunnel
|
a virtual, private pathway over a public or shared network from the VPN client to the VPN server
|
|
Business process reengineering
|
activity of altering and designing business processes to take advantage of new information systems
|
|
customer life cycle
|
4 phases: marketing, customer acquisition, relationship management, and loss/churn.
|
|
customer relationship management (CRM)
|
a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service
|
|
departmental information system
|
workgroup information systems that support a particular department. Example: accounts payable system used by accounts payable department
|
|
Enterprise application integration (EAI)
|
suite of software applications that integrates existing systems by providing layers of software that connect applications together.
|
|
Enterprise information system
|
information systems that span an organization and support activities in multiple departments
|
|
enterprise resource planning (ERP)
|
suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform
|
|
functional information system
|
other workgroup information systems support a particular business function
|
|
information silo
|
a condition that exists when data are isolated in separated information systems
|
|
inherent processes
|
redesigned procedures for using the software products, saved organizations from expensive and time-consuming business process reengineering
|
|
interenterprise information system
|
information systems that are shared by two or more independent organizations
|
|
island of automation
|
another term for information silo
|
|
Personal information system
|
information systems used by a single individual
|
|
self-efficacy
|
a person's belief that he or she can be successful at his or her job
|
|
workgroup information system
|
an information system that is shared by a group of people for a particular purpose
|
|
petabyte
|
10^15 bytes
|
|
exabyte
|
largest unit of memory
|
|
business intelligence (BI)
|
information containing patterns, relationships, and trends.
|
|
Business intelligence (BI) system
|
information system that provides information for improving decision making
|
|
reporting systems
|
integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing
|
|
data mining systems
|
process data using sophisticated statistical techniques such as regression analysis and decision tree analysis
|
|
market-basket analysis
|
another data mining system, which computes correlations of items on past orders to determine items that are frequently purchased together
|
|
Knowledge management (KM) systems
|
create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customer, suppliers, and other who need it
|
|
expert systems
|
encapsulate the knowledge of human experts in the form of If/Then rules
|
|
dirty data
|
problematic data
|
|
granularity
|
refers to the degree of summarization or detail
|
|
clickstream data
|
capture the customers' clicking behavior
|
|
curse of dimensionality
|
the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor
|
|
data warehouse
|
to extract and clean data from operational systems and other sources and to store and catalog that data for processing by BI tools
|
|
data mart
|
a data collection that is created to address the needs of a particular business function, problem, or opportunity
|
|
data mining
|
the application of statistical techniques to find patterns and relationships among data and to classify and predict
|
|
unsupervised data mining
|
do not create a model or hypothesis before running the analysis. apply the data mining technique to the data and observe the results
|
|
cluster analysis
|
identify groups of entities that have similar characteristics
|
|
supervised data mining
|
data miners develop a model prior to the analysis
|
|
regression analysis
|
measures the impact of a set of variables on another variable
|
|
neural networks
|
used to predict values and make classifications
|
|
systems development or systems analysis and design
|
the process of creating and maintaining information systems
|
|
Brooks' Law
|
points out a related problem: Adding more people to a late project makes the project later
|
|
Systems development life cycle (SDLC)
|
the traditional process used to develop information systems
|
|
cost feasibility
|
involves an assessment of the cost of the project
|
|
schedule feasibility
|
the time it will take to build the system
|
|
technical feasibility
|
refers to whether existing information technology is likely to be able to meet the needs of the new system
|
|
organizational feasibility
|
concerns whether the new system fits within the organizations's customs, culture, charter, or legal requirements
|
|
business analysts
|
specialize in understanding business needs, strategies, and goals and helping businesses implement systems to accomplish their competitive strategies
|
|
systems analysts
|
IT professionals who understand business and technology
|
|
test plan
|
consists of sequences of actions that users will take when using the new system
|
|
Product quality assurance (PQA)
|
usually construct the test plan with the advice and assistance of users
|
|
beta testing
|
the process of allowing future systems users to try out the new system on their own
|
|
system conversion
|
often used for this activity because it implies the process of converting business activity from the old system to the new
|
|
pilot installation
|
the organization implements the entire system on a limited portion of the business
|
|
phased installation
|
the new system is installed in phases across the organization
|
|
parallel installation
|
the new system runs in parallel with the old one until the new system is tested and fully operational
|
|
plunge installation
|
organization shuts off the old system and starts the new system
|
|
path
|
group fixes for high-priority failures
|
|
services packs
|
usually bundle fixes of low-priority problems int larger groups
|
|
waterfall
|
the process is supposed to operate in a sequence of nonrepetitive phases
|
|
agile enterprise
|
an organization that can quickly adapt to changes in the market, industry, product, law, or other significant external factors
|
|
Chief Information officer (CIO)
|
principle manager of the IS department
|
|
chief technology officer (CTO)
|
heads the technology group
|
|
tangible benefits
|
those for which a dollar value can be computed
|
|
intangible benefits
|
those for which it is impossible to compute a dollar value
|
|
security threats
|
human error and mistakes, malicious human activity, and natural events and disasters
|
|
unauthorized data disclosure
|
occur by human error when someone inadvertently releases data in violation of policy
|
|
pretexting
|
occurs when someone deceives by pretending to be someone else
|
|
phishing
|
a similar technique for obtaining unauthorized data that uses pretexting via email
|
|
spoofing
|
another term for someone pretending to be someone else
|
|
IP spoofing
|
occurs when an intruder uses another site's IP address as if it were that other site
|
|
Email spoofing
|
a synonym for phishing
|
|
sniffing
|
a technique for intercepting computer communications
|
|
Drive-by sniffers
|
take computers with wireless connections through an area and search for unprotected wireless networks
|
|
hacking
|
occurs when a person gains unauthorized access to a computer system
|
|
usurpation
|
occurs when unauthorized programs invade a computer system and replace legitimate programs
|
|
denial of service (DOS)
|
human error in following procedures or a lack or procedures
|
|
technical safeguards
|
involve the hardware and software components of an information system
|
|
smart card
|
is a plastic card similar to a credit card
|
|
personal identification number (PIN)
|
required for smart cards
|
|
biometric authentication
|
uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users
|
|
encryption
|
the process of transforming clear text into coded, unintelligible text for secure storage or communication
|
|
encryption algorithms
|
(procedures for encrypting data) that are difficult to break
|
|
key
|
a numbers used to encrypt the data
|
|
symmetric encryption
|
the same key (again, a number) is used to encode and to decode
|
|
asymmetric algorithms
|
two keys are used; one encodes the message, and the other key decodes the message
|
|
public key/private key
|
each site has a public key for encoding messages and a private key for decoding them
|
|
HTTPS
|
most secure communication over the Internet uses a protocol
|
|
Secure Socket Layer (SSL)
|
data are encrypted using a protocol
|
|
Transport Layer Security (TLS)
|
same as Secure Socket Layer
|
|
firewall
|
computing device that prevents unauthorized network acess
|
|
perimeter firewall
|
sits outside he organizational network; the first device that internet traffic encounters
|
|
internal firewalls
|
inside the organizational network
|
|
packet-filtering firewall
|
examines each part of a message and determines whether to let that part pass
|
|
malware
|
viruses, worms, trojan horses, spyware, and adware
|
|
virus
|
computer program that replicates itself
|
|
payload
|
program code that causes unwanted activity
|
|
trojan horses
|
viruses that masquerade as useful programs or files
|
|
macro viruses
|
attach themselves to Word, Excel, or other types of documents
|
|
worm
|
a virus that propagates using the Internet or other computer network
|
|
spyware
|
programs are installed on the user's computer without the user's knowledge or permission
|
|
adware
|
similar to spyware in that it is installed without the user's permission and it also resides in the background and observes user behavior
|
|
malware definitions
|
patterns that exist in malware code--should be downloaded frequently
|
|
Data safeguards
|
protect databases and other organizational data
|
|
data administration
|
refers to an organization-wide function that is in charge of developing data policies and enforcing data standards
|
|
database administration
|
refers to a function that pertains to a particular database
|
|
key escrow
|
when data are encrypted, a trusted party should have a copy of the encryption key
|
|
human safeguards
|
involve the people and procedure components of information systems
|
|
hot sites
|
remote processing centers run by commercial disaster-recovery services
|
|
cold sites
|
provide office space, but customers themselves provide and install the equipment needed to continue operations
|
|
business process management (BPM)
|
a cyclical (recurring) process for systematically creating, assessing, and altering business processes
|
|
as-is model
|
documents the current situation and then changes that model to make adjustments necessary to solve process problems
|
|
COBIT (control objectives for information and related technology)
|
often used in the assessment stage of the BPM cycle
|
|
Object Management Group (OMG)
|
created a standard set of terms and graphical notations for documenting business processes
|
|
Business Process Modeling Notation (BPMN)
|
standard created by Object Management Group
|
|
service-oriented architecture (SOA)
|
constructs processes so that primary activities are modeled as independent, encapsulated services and so that processes communicate only by requesting and responding to service requests
|
|
service
|
a repeatable task that a business needs to perform
|
|
encapsulation
|
design practice that places the logic in one place; all other services go to that one place for that service
|
|
XML (eXtensible Markup Language)
|
markup language like HTML but it solves several important HTML problems
|
|
tags
|
metadata that name and identify data items
|
|
XML document
|
complete set of XML tags and data
|
|
XML schema
|
an XML document whose content describes the structure of other XML documents
|
|
SOAP
|
a protocol for exchanging messages encoded in XML
|
|
web services description language (WSDL)
|
language for describing the programmatic interface to a service. Makes service-to-service programming much easier
|