• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back

business intelligence (BI)

Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace

computer literacy

Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the internet, and collaboration tools and technologies

information literacy

Understanding the role of information in generating and using business intelligence

data

Consists of raw facts and is a component of an information system

database

A collection of all relevant data organized in a series of integrated files

process

Component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis

information

Consists of facts that have been analyzed by the process component and is an output of an information system

management information system (MIS)

An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision making purposes

transaction-processing system (TPS)

Focus on data collection and processing; the major reason for using them is cost reduction

application software

Can be commercial software or software developed in house and is used to perform a variety of tasks on a personal computer

arithmetic logic unit (ALU)

Performs arithmetic operations as well as comparison or relational operations; the latter are used to compare numbers

central processing unit (CPU)

The heart of a computer. It is divided into two components: the arithmetic logic unit and the control unit

control unit

Tells the computer what to do, such as instructing the computer which device to read or send output to

input devices

Send data and information to the computer. Examples include a keyboard and mouse

output devices

Capable of representing information from a computer. The form of this output might be visual, audio, or digital; examples include printers, display monitors, and plotters

main memory

Stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance

operating system (OS)

A set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users

random access memory (RAM)

Volatile memory, in which data can be read from and written to; it is also called read-write memory

server

A computer and all the software for managing network resources and offering services to a network.

storage area network (SAN)

A dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices

business analytics (BA)

Uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on

create read update delete (CRUD)

Refers to the range of functions that data administrators determine who has permission to perform certain functions

data dictionary

Stores definitions, such as data types for fields, default values, and validation rules for data in each field

data-driven Web site

Acts as an interface to a database, retrieving data for users and allowing users to enter data in the database

data model

Determines how data is created, represented, organized, and maintained. It usually contains data structure, operations, and integrity rules

database management system (DBMS)

Software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient

data mining

Used to discover patterns and relationships

object-oriented databases

Both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object's data

primary key

Uniquely identifies every record in a relational database. Examples include student ID numbers, account numbers, Social Security numbers, and invoice numbers

relational model

Uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes)

structured query language (SQL)

A standard fourth generation query language used by many DBMS packages, such as Oracle 11g and Microsoft SQL Server. SQL consists of several keywords specifying actions to take

acceptable use policy

a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

cookies

small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

cybersquatting

registering, selling, or using a domain name to profit from someone else's trademark.

green computing

involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment.

intellectual property

a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

spam

unsolicited e-mail sent for advertising purposes.

adware

a form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser.

availability

computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

biometric security measures

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

computer fraud

the unauthorized use of computer data for personal gain.

confidentiality

a system must prevent disclosing information to anyone who is not authorized to access it.

denial-of-service (DoS)

floods a network or server with service requests to prevent legitimate users' access to the system.

firewall

a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

integrity

the accuracy of information resources within an organization.

secure socket layer (SSL)

a commonly used encryption protocol that manages transmission security on the Internet.

spyware

software that secretly gathers information about users while they browse the Web.

trojan program

contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the popular program, unaware that the malicious program is also running in the background.

phishing

sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

virus

self-propagating program code that is triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues.

virtual private network

provides a secure "tunnel" through the Internet for transmitting messages and data via a private network.

worm

travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program.

bandwidth

the amount of data that can be transferred from one point to another in a certain time period, usually one second.

broadband

multiple pieces of data are sent simultaneously to increase the transmission rate.

communication media (conducted vs. radiated)

connect sender and receiver devices. They can be conducted or radiated.


C-provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.


R-use an antenna for transmitting data through air or water.

convergence

refers to integrating voice, video, and data so that multimedia information can be used for decision making.

data communication

the electronic transfer of data from one location to another.

local area network (LAN)

connects workstations and peripheral devices that are in close proximity.

mobile network

a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter, known as a cell site or base station.

protocols

rules that govern data communication, including error detection, message length, and transmission speed.

router

a network connection device containing software that connects network systems and controls traffic flow between them.

Transmission Control Protocol/Internet Protocol (TCP/IP)

an industry-standard suite of communication protocols that enables interoperability.

wireless network

a network that uses wireless instead of wired technology.