• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/283

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

283 Cards in this Set

  • Front
  • Back
Moore's Law
the cost of data communications and data storage is essentially zero
Abstract Reasoning
the ability to make and manipulate models
Systems Thinking
the ability to model components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed
Collaboration
the activity of two or more people working together to achieve a common goal, result, or work product.
Experimentation
making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have
System
a group of components that interact to achieve some purpose
Information System (IS)
group of components that interact to produce information
Five-component framework
hardware, software, data, procedures, and people
computer-based information system
information system to include a computer
MIS/Management Information Systems
development and use of information systems that help businesses achieve their goals and objectives
Information Technology (IT)
refers to the products, methods, inventions, and standards that are used for the purpose of producing informations
strong password
obvious
business process
network of activities, roles, resources, repositories, and data flows that interact to accomplish a business function
activities
collections of related tasks that receive inputs and process those inputs to produce outputs
decision
question that can be answered Yes or No. Provide branching points within the flow of a business process
roles
sets of procedures
resources
people, facilities, or computer programs that are assigned to roles
repository
a collection of business records. holds the collective memory of the organization
data flow
the movement of a data item from one activity to another activity or to a repository
information
knowledge derived from data, where data is defined as recorded facts or figures
accurate information
information that is based on correct and complete data
timely information
information that is produced in time for its intended use
relevant information
information that directly pertains to both the context and to the subject it references
Just barely sufficient information
information that is sufficient for the purpose for which it is generated, but only so
worth its cost
an appropriate relationship must exist between the cost of information and its value
Five Forces Model
competitive forces: competition from vendors of substitutes, from new competitors, and from existing rivals
bargaining power forces: bargaining power of suppliers and customers
Competitive strategy
Industry-wide, cost, differentiation, focus
value
the amount of money that a customer is willing to pay for a resource, product, or service
margin
difference between the value that an activity generates and the cost of the activity
value chain
network of value-creating activities
primary activities
business functions that relate directly to the production of the organization's products or services
support activities
business functions that assist and facilitate the primary activities
linkages
interactions across value activities
switching costs
organizations can lock in customers by making it difficult or expensive for customers to switch to another product
hardware
consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software
input hardware
keyboard, mouse, printer
central processing unit (cpu)
"the brain" of the computer
dual-processor
two cpu's
quad-processor
4 cpu's
main memory
consists of circuitry for storing data and instructions that are acted upon by the CPU
RAM
random access memory
special function cards
electronic components on thin fiberglass backing that can be added to the computer to augment its basic capabilities
output hardware
consists of video displays, printers, audio speakers....
storage hardware
saves data and programs
binary digits
how computers represent data
bits
a zero or a one. used for computer data because they are easy to represent electronically
bytes
8 bits = bytes
kilobyte (k)
1,024 bytes
megabyte (MB)
1,024 K = 1,048,576 bytes
Gigabyte (GB)
1,024 MB = 1,073,741,824 bytes
Terabyte (TB)
1,024 GB = 1,099,511,627,776 bytes
data channel/bus
moves instruction from main memory into CPU
cache
CPU has a small amount of very fast memory
operating system (OS)
a program that controls the computer's resources
memory swapping
if there is not enough memory, it will remove something and then it will place the just-requested program or data into the vacated space
32-bit CPU
processor that can effectively utilize up to 4 GB of main memory
64-bit CPU
a processor that can use, by today's standards, an almost unlimited amount of main memory
volatile
contents are lost when the power is off
nonvolatile
contents survive when the power is off.
client
computers for word processing, spreadsheets, database access, and so forth
servers
provide a service. server is a computer
server farm
collection of servers
Unix
operating system that was developed by Bell Labs
Linux
version of Unix that was developed by the Open Source Community
Open Source Community
a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux
license
the right to use a certain number of copies of that program subject to limits on the vendor's liability
site license
a flat fee payment for the right to install the product on all of that company's computers or on all of the computers at a specific site
cloud computing
a form of hardware/software leasing in which organizations obtain server resources from venors that specialize in server processing
virtualization
process whereby multiple operating systems share the same hardware
application software
performs a service or function
horizontal-market application
software provides capabilities common across all organizations and industries
vertical-market application
software serves the needs of a specific industry
one-of-a-kind application
software is developed for a specific, unique need
custom-developed software
tailor-made software
firmware
computer software that is installed into devices such as printers, print servers, and various types of communication devices
desktop programs
programs that run only on your computer (Word, Excel)
client-server applications
applications that process code on both the client and the server.
thick-client
application program that must be preinstalled on the client
thin-client
runs within a browser and need not be preinstalled
Source code
computer code as written by humans that is understandable by humans
machine code
code processed by a computer
closed source
highly protected source code that is only available to trusted employees and carefully vetted contractors
database
self-describing collection of integrated records
byte
character of data
columns or fields
how bytes are grouped
rows or records
how columns or fields are grouped
table or file
group of similar rows or records
key
column or group of columns that identifies a unique row in a table
foreign keys
what connects two tables together
relational databases
databases that carry their data in the form of tables and that represent relationships using foreign keys
metadata
data that describes data
database application system
assembly of forms, reports, queries, and application programs that process a database
database management system (DBMS)
a program used to create, process, and administer a database
Structured Query Language (SQL)
an international standard language for processing a database
database application
collection of forms, reports, queries, and application programs that process a database
form
used to read, insert, modify, and delete data
report
show data in a structured context
multiuser processing
multiple users processing the database
lost-update problem
exemplifies one of the special characteristics of multiuser database processing
Enterprise DBMS
products process large organizational and workgroup databases
Personal DBMS
used for personal or small workgroup applications that involve fewer than 100 users, and normally fewer than 15
network
a collection of computers that communicate with one another over transmission lines or wirelessly
local area network (LAN)
connects computers that reside in a single geographic location on the premises of the company that operates the LAN
wide area networks (WAN)
connect computers at different geographic locations
internet
network of networks
the Internet
collection of networks that you use when you send email or access a Web site
protocol
set of rules that two communicating devices follow
Small office or home office
SOHO
switch
a special-purpose computer that receives and transmits wired traffic on the LAN
LAN device
contains several important networking components
Network interface card (NIC)
device that connects the computer's or printer's circuitry to the network cables
onboard NIC
NIC built into computer's circuitry
unshielded twisted pair (UTP) cable
contains sets of wires that are twisted together to improve signs quality
optical fiber cables
signals = light rays, they are reflected inside the glass core of the optical fiber cable
wireless NIC (WNIC)
used instead of a NIC
access point
the component of the LAN device that processes wireless traffic and communicates with the wired switch
IEEE 802.3 protocol (Ethernet)
used for wired LAN connections; describes how messages are to be packaged and processed for wired transmission over the LAN
10/100/1000 Ethernet
conform to the 802.3 specification and allows for transmission at a rate of 10, 100, or 1000 Mbps
IEEE 802.11 protocol
wireless LAN connections
bluetooth
designed for transmitting data over short distances, replacing cables
Internet service provider (ISP)
provides a legitimate internet address, servers as gateway to the internet
modem
convers digital data to analog signals
Digital subscriber line (DSL) modems
operate on the same lines as voice telephones, but their signals do not interfere with voice telephone service
asymmetric digital subscriber lines (ADSL)
DSL lines that have different upload and download speeds
Symmetrical digital subscriber lines (SDSL)
meet this need by offering the same fast speed in both directions
cable modems
provide high-speed data transmission using cable television lines
Cell phone protocols
EVDO, HSDPA, WiMax
narrowband
transmission speeds less than 56 kbps
broadband
speeds in excess of 256 kbps
TCP/IP Protocol architecture
a scheme of five protocol types arranged in layers
Hypertext Transport protocol (HTTP)
protocol used between browsers and Web servers f
HTTPS
secure version of HTTP
Simple Mail Transfer Protocol (SMTP)
used for email transmissions
File Transfer Protocol (FTP)
used to move files over the Internet
Web
the Internet-based network of browsers and servers that process HTTP or HTTPS
Transmission Control Protocol (TCP)
breaks traffic up into pieces and send each piece along its way
IP (internet protocol)
specifies the routing of the pieces of your data communication through the networks that comprise any internet
packet
a piece of a message that is handled by programs that implement IP
router
special purpose computer that moves packet traffic according to the rules of IP
IP address
number that identifies a particular device
Public IP addresses
identify a particular device on the public Internet
ICANN (Internet Corporation for Assigned Names and Number)
controls IP addresses
IPv4
four decimal dotted notation like 165.193.123.253
IPv6
longer format
domain name
a unique name that is affiliated with a public IP address
URL (Uniform Resource Locator)
an address on the Intenet
Three-tier architecture
arrangement of user computers and servers into three categories
user tier
consists of computers, phones, and other devices that have browsers that request and process Web pages
server tier
consists of computers that run Web servers and process application programs
database tier
consists of computers that run a DMBS that processes SQl requests to retrieve and store data
Web page
a document that is coded in one of the standard page markup languages
web servers
programs that run on a server tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients
commerce server
application program that runs on a server tier computer
web form
commercial websites usually are supported by several or even many Web server computers in a facility
Hypertext Markup Language (HTML)
is the most common language for defining the structure and layout of web pages
tag
notation used to define a data element for display or other purposes
hyperlinks
pointers to other Web pages
attribute
variable used to provide properties about a tag
XML (eXtensible Markup Language)
a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web
flash
an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser
Silverlight
browser add-on that was developed by Microsoft for the same purposes as Flash
Virtual Private network (VPN)
uses the Internet to create the appearance of private point-to-point connections
tunnel
a virtual, private pathway over a public or shared network from the VPN client to the VPN server
Business process reengineering
activity of altering and designing business processes to take advantage of new information systems
customer life cycle
4 phases: marketing, customer acquisition, relationship management, and loss/churn.
customer relationship management (CRM)
a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service
departmental information system
workgroup information systems that support a particular department. Example: accounts payable system used by accounts payable department
Enterprise application integration (EAI)
suite of software applications that integrates existing systems by providing layers of software that connect applications together.
Enterprise information system
information systems that span an organization and support activities in multiple departments
enterprise resource planning (ERP)
suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform
functional information system
other workgroup information systems support a particular business function
information silo
a condition that exists when data are isolated in separated information systems
inherent processes
redesigned procedures for using the software products, saved organizations from expensive and time-consuming business process reengineering
interenterprise information system
information systems that are shared by two or more independent organizations
island of automation
another term for information silo
Personal information system
information systems used by a single individual
self-efficacy
a person's belief that he or she can be successful at his or her job
workgroup information system
an information system that is shared by a group of people for a particular purpose
petabyte
10^15 bytes
exabyte
largest unit of memory
business intelligence (BI)
information containing patterns, relationships, and trends.
Business intelligence (BI) system
information system that provides information for improving decision making
reporting systems
integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing
data mining systems
process data using sophisticated statistical techniques such as regression analysis and decision tree analysis
market-basket analysis
another data mining system, which computes correlations of items on past orders to determine items that are frequently purchased together
Knowledge management (KM) systems
create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customer, suppliers, and other who need it
expert systems
encapsulate the knowledge of human experts in the form of If/Then rules
dirty data
problematic data
granularity
refers to the degree of summarization or detail
clickstream data
capture the customers' clicking behavior
curse of dimensionality
the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor
data warehouse
to extract and clean data from operational systems and other sources and to store and catalog that data for processing by BI tools
data mart
a data collection that is created to address the needs of a particular business function, problem, or opportunity
data mining
the application of statistical techniques to find patterns and relationships among data and to classify and predict
unsupervised data mining
do not create a model or hypothesis before running the analysis. apply the data mining technique to the data and observe the results
cluster analysis
identify groups of entities that have similar characteristics
supervised data mining
data miners develop a model prior to the analysis
regression analysis
measures the impact of a set of variables on another variable
neural networks
used to predict values and make classifications
systems development or systems analysis and design
the process of creating and maintaining information systems
Brooks' Law
points out a related problem: Adding more people to a late project makes the project later
Systems development life cycle (SDLC)
the traditional process used to develop information systems
cost feasibility
involves an assessment of the cost of the project
schedule feasibility
the time it will take to build the system
technical feasibility
refers to whether existing information technology is likely to be able to meet the needs of the new system
organizational feasibility
concerns whether the new system fits within the organizations's customs, culture, charter, or legal requirements
business analysts
specialize in understanding business needs, strategies, and goals and helping businesses implement systems to accomplish their competitive strategies
systems analysts
IT professionals who understand business and technology
test plan
consists of sequences of actions that users will take when using the new system
Product quality assurance (PQA)
usually construct the test plan with the advice and assistance of users
beta testing
the process of allowing future systems users to try out the new system on their own
system conversion
often used for this activity because it implies the process of converting business activity from the old system to the new
pilot installation
the organization implements the entire system on a limited portion of the business
phased installation
the new system is installed in phases across the organization
parallel installation
the new system runs in parallel with the old one until the new system is tested and fully operational
plunge installation
organization shuts off the old system and starts the new system
path
group fixes for high-priority failures
services packs
usually bundle fixes of low-priority problems int larger groups
waterfall
the process is supposed to operate in a sequence of nonrepetitive phases
agile enterprise
an organization that can quickly adapt to changes in the market, industry, product, law, or other significant external factors
Chief Information officer (CIO)
principle manager of the IS department
chief technology officer (CTO)
heads the technology group
tangible benefits
those for which a dollar value can be computed
intangible benefits
those for which it is impossible to compute a dollar value
security threats
human error and mistakes, malicious human activity, and natural events and disasters
unauthorized data disclosure
occur by human error when someone inadvertently releases data in violation of policy
pretexting
occurs when someone deceives by pretending to be someone else
phishing
a similar technique for obtaining unauthorized data that uses pretexting via email
spoofing
another term for someone pretending to be someone else
IP spoofing
occurs when an intruder uses another site's IP address as if it were that other site
Email spoofing
a synonym for phishing
sniffing
a technique for intercepting computer communications
Drive-by sniffers
take computers with wireless connections through an area and search for unprotected wireless networks
hacking
occurs when a person gains unauthorized access to a computer system
usurpation
occurs when unauthorized programs invade a computer system and replace legitimate programs
denial of service (DOS)
human error in following procedures or a lack or procedures
technical safeguards
involve the hardware and software components of an information system
smart card
is a plastic card similar to a credit card
personal identification number (PIN)
required for smart cards
biometric authentication
uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users
encryption
the process of transforming clear text into coded, unintelligible text for secure storage or communication
encryption algorithms
(procedures for encrypting data) that are difficult to break
key
a numbers used to encrypt the data
symmetric encryption
the same key (again, a number) is used to encode and to decode
asymmetric algorithms
two keys are used; one encodes the message, and the other key decodes the message
public key/private key
each site has a public key for encoding messages and a private key for decoding them
HTTPS
most secure communication over the Internet uses a protocol
Secure Socket Layer (SSL)
data are encrypted using a protocol
Transport Layer Security (TLS)
same as Secure Socket Layer
firewall
computing device that prevents unauthorized network acess
perimeter firewall
sits outside he organizational network; the first device that internet traffic encounters
internal firewalls
inside the organizational network
packet-filtering firewall
examines each part of a message and determines whether to let that part pass
malware
viruses, worms, trojan horses, spyware, and adware
virus
computer program that replicates itself
payload
program code that causes unwanted activity
trojan horses
viruses that masquerade as useful programs or files
macro viruses
attach themselves to Word, Excel, or other types of documents
worm
a virus that propagates using the Internet or other computer network
spyware
programs are installed on the user's computer without the user's knowledge or permission
adware
similar to spyware in that it is installed without the user's permission and it also resides in the background and observes user behavior
malware definitions
patterns that exist in malware code--should be downloaded frequently
Data safeguards
protect databases and other organizational data
data administration
refers to an organization-wide function that is in charge of developing data policies and enforcing data standards
database administration
refers to a function that pertains to a particular database
key escrow
when data are encrypted, a trusted party should have a copy of the encryption key
human safeguards
involve the people and procedure components of information systems
hot sites
remote processing centers run by commercial disaster-recovery services
cold sites
provide office space, but customers themselves provide and install the equipment needed to continue operations
business process management (BPM)
a cyclical (recurring) process for systematically creating, assessing, and altering business processes
as-is model
documents the current situation and then changes that model to make adjustments necessary to solve process problems
COBIT (control objectives for information and related technology)
often used in the assessment stage of the BPM cycle
Object Management Group (OMG)
created a standard set of terms and graphical notations for documenting business processes
Business Process Modeling Notation (BPMN)
standard created by Object Management Group
service-oriented architecture (SOA)
constructs processes so that primary activities are modeled as independent, encapsulated services and so that processes communicate only by requesting and responding to service requests
service
a repeatable task that a business needs to perform
encapsulation
design practice that places the logic in one place; all other services go to that one place for that service
XML (eXtensible Markup Language)
markup language like HTML but it solves several important HTML problems
tags
metadata that name and identify data items
XML document
complete set of XML tags and data
XML schema
an XML document whose content describes the structure of other XML documents
SOAP
a protocol for exchanging messages encoded in XML
web services description language (WSDL)
language for describing the programmatic interface to a service. Makes service-to-service programming much easier