Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
business intelligence (BI) |
Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace |
|
computer literacy |
Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the internet, and collaboration tools and technologies |
|
information literacy |
Understanding the role of information in generating and using business intelligence |
|
data |
Consists of raw facts and is a component of an information system |
|
database |
A collection of all relevant data organized in a series of integrated files |
|
process |
Component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis |
|
information |
Consists of facts that have been analyzed by the process component and is an output of an information system |
|
management information system (MIS) |
An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision making purposes |
|
transaction-processing system (TPS) |
Focus on data collection and processing; the major reason for using them is cost reduction |
|
application software |
Can be commercial software or software developed in house and is used to perform a variety of tasks on a personal computer |
|
arithmetic logic unit (ALU) |
Performs arithmetic operations as well as comparison or relational operations; the latter are used to compare numbers |
|
central processing unit (CPU) |
The heart of a computer. It is divided into two components: the arithmetic logic unit and the control unit |
|
control unit |
Tells the computer what to do, such as instructing the computer which device to read or send output to |
|
input devices |
Send data and information to the computer. Examples include a keyboard and mouse |
|
output devices |
Capable of representing information from a computer. The form of this output might be visual, audio, or digital; examples include printers, display monitors, and plotters |
|
main memory |
Stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance |
|
operating system (OS) |
A set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users |
|
random access memory (RAM) |
Volatile memory, in which data can be read from and written to; it is also called read-write memory |
|
server |
A computer and all the software for managing network resources and offering services to a network. |
|
storage area network (SAN) |
A dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices |
|
business analytics (BA) |
Uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on |
|
create read update delete (CRUD) |
Refers to the range of functions that data administrators determine who has permission to perform certain functions |
|
data dictionary |
Stores definitions, such as data types for fields, default values, and validation rules for data in each field |
|
data-driven Web site |
Acts as an interface to a database, retrieving data for users and allowing users to enter data in the database |
|
data model |
Determines how data is created, represented, organized, and maintained. It usually contains data structure, operations, and integrity rules |
|
database management system (DBMS) |
Software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient |
|
data mining |
Used to discover patterns and relationships |
|
object-oriented databases |
Both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object's data |
|
primary key |
Uniquely identifies every record in a relational database. Examples include student ID numbers, account numbers, Social Security numbers, and invoice numbers |
|
relational model |
Uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes) |
|
structured query language (SQL) |
A standard fourth generation query language used by many DBMS packages, such as Oracle 11g and Microsoft SQL Server. SQL consists of several keywords specifying actions to take |
|
acceptable use policy |
a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
|
|
cookies |
small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive. |
|
cybersquatting |
registering, selling, or using a domain name to profit from someone else's trademark. |
|
green computing |
involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment. |
|
intellectual property |
a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses. |
|
spam |
unsolicited e-mail sent for advertising purposes. |
|
adware |
a form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser. |
|
availability |
computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster. |
|
biometric security measures |
use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others. |
|
computer fraud |
the unauthorized use of computer data for personal gain. |
|
confidentiality |
a system must prevent disclosing information to anyone who is not authorized to access it. |
|
denial-of-service (DoS) |
floods a network or server with service requests to prevent legitimate users' access to the system. |
|
firewall |
a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked. |
|
integrity |
the accuracy of information resources within an organization. |
|
secure socket layer (SSL) |
a commonly used encryption protocol that manages transmission security on the Internet. |
|
spyware |
software that secretly gathers information about users while they browse the Web. |
|
trojan program |
contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the popular program, unaware that the malicious program is also running in the background. |
|
phishing |
sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. |
|
virus |
self-propagating program code that is triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues. |
|
virtual private network |
provides a secure "tunnel" through the Internet for transmitting messages and data via a private network. |
|
worm |
travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program.
|
|
bandwidth |
the amount of data that can be transferred from one point to another in a certain time period, usually one second. |
|
broadband |
multiple pieces of data are sent simultaneously to increase the transmission rate. |
|
communication media (conducted vs. radiated) |
connect sender and receiver devices. They can be conducted or radiated. C-provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. R-use an antenna for transmitting data through air or water. |
|
convergence |
refers to integrating voice, video, and data so that multimedia information can be used for decision making. |
|
data communication |
the electronic transfer of data from one location to another. |
|
local area network (LAN) |
connects workstations and peripheral devices that are in close proximity. |
|
mobile network |
a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter, known as a cell site or base station. |
|
protocols |
rules that govern data communication, including error detection, message length, and transmission speed. |
|
router |
a network connection device containing software that connects network systems and controls traffic flow between them. |
|
Transmission Control Protocol/Internet Protocol (TCP/IP) |
an industry-standard suite of communication protocols that enables interoperability. |
|
wireless network |
a network that uses wireless instead of wired technology.
|