• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/136

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

136 Cards in this Set

  • Front
  • Back
AI Technologies
Can be used to decrease the cost of surveillance
ALU
part of a CPU
analysis
phase in SDLC
anaylsis
phase of the SDLC gathers business requirements
anaylsis phase of SDLC
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
Antivirus software
the most common type of defense within detection and response technologies
API
a set of routines, protocols, and tools for building software applications
Application Software
Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
Arithmetic Logic Unit (ALU)
Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)
Assumes users can specify all business requirements in advance
an issue related to the waterfall methodology
Authentication
A method for confirming users' identities
Bandwidth
a measure of how much information can be carried over communication media
boomerangs
types of social networks organizations can implement
Botnets
Some are controlled by foreign intelligence agencies
Brick-and-Mortar Business
A business that operates in a physical store without an Internet presence
BUS
a network topology
Bus Width
The size of the internal electrical pathway along which signals are sent from one part of the computer to another
Business Process
A standardized set of activities that accomplish as specific task, such as processing a customer's order
Central Processing Unit (CPU) (Microprocessor)
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
Click-and-Mortar Business
A business that operates in a physical store and on the Internet
client
A computer that is designed to request information from a server
Communication protocol
a standard (or agreement) to communicate in a specific way
Complex Instruction Set Computer (CISC) Chip
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
compliance
the act of conforming, acquiescing or yeilding
computer memory
usually divided into primary and secondary
Content Providers
Companies that use the Internet to distribute copyrighted content, including news, music, games, books, movies, and many other types of information
control unit
part of a CPU
Data Management
Provides the tools for data retrieval, modification, deletion, and insertion
data mining
process of analyzing data to extract info not offered by the raw data alone
data warehouse
a logical colletion of info-gathered from many different operational databases- that supports business analysis activities and decision making task
Decision-Making Information Systems
Build models out of organizational information to lend insight into important business issues and opportunities
design
phase in SDLC
design phase in SDLC
Involves describing the desired features and operations of the system
Digital Dashboard
Integrates information from multiple components and tailors the information to individual preferences
Disk Optimization
Organizes information on a hard disk in the most efficient way
Drill-Down Capability
Enables users to get details, and details of details, of information
early computers
were made with vacuum tubes that failed often
elecronic tagging
a technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards
Encryption
Scrambles information into an alternative form that requires a key or password to decrypt the information
enforcement of copyright
harder in peer-to-peer
Entity
person, place, thing, transaction, or eventabout which infromation is stored in the relational database model
Expert Systems
The most commonly used form of AI in the business arena
feasability study
Determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint
fiber opticals
a type of communication media
Files Stored on a Internet Web Site
Do not have the same legal protection as files stored on your home computer
Firewalls
Examines each message that wants entrance to the network
Firewalls
Blocks messages without the correct markings from entering the network
Firewalls
Detects computers communicating with the Internet without approval
Flaws in accurately defining and articulating the business problem
an issue related to the waterfall methodology
foriegn key
a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship amoung 2 tables
Fourth Amendment
Protects privacy rights
Genetic Algorithm
An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
Goal of AI
The ability to build a system that can mimic human intelligence
Goal-Seeking Analysis
A quantitative model typically used by a DSS
Hardware
Consists of the physical devices associated with a computer system
Hypertext Transport Protocol
The Internet standard that supports the exchange of information on the WWW
implementationi phase in SDLC
Involves placing the system into production so users can begin to perform actual business operations with the system
In a Gantt chart Tasks are listed in a Gantt chart
vertically
increased revenues
a business-related consequence of successful software
input
data
Input Device
Equipment used to capture information and commands
Intelligent Agent
A special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users
Intermediaries
Agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance E-business
Internet
A global public network of computer networks that pass information from one to another using common computer protocols
Internet Service Provider (ISP)
A company that provides individuals and other companies access to the Internet along with additional related services, such as website building
IT
the most common function outsourced
LinkedIn
the name of the largest social networking site for business professional recruiters
lower level languages
closer to what the computer can actually understand than higer level langauges.
Magnetic Tape
An older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium
Malicious Code
Includes a variety of threats such as viruses, worms, and Trojan horses
Managing costs, resources, and time constraints
an issue related to the waterfall methodology
Market Makers
Intermediaries that aggregate three services for market participants (1) a place to trade, (2) rules to govern trading, and (3) an infrastructure to support trading
marketing networks
types of social networks organizations can implement
Megabyte (MB) (M) (Meg)
Roughly 1 million bytes
Megahertz (MHz)
The number of millions of CPU cycles per second
Modem
used to change a digital signal to an analog signal and back again
Multiply by number of switches by 2; Square Answer
To find how many switches could represnt patterns of 0s and 1s
network
a communications, data exchange, and resource-sharing system created by linking 2 or more computers and establishing standards. or protocols, so that they can work together
network database
database structure that offers a flexible way of representing objects and their relationships
Neural Network
A category of AI that attempts to emulate the way the human brain works
Online Brokers
Acts as an intermediary between buyers and sellers of goods and services
Optical-Mark Recognition
Detects the presence or absence of a mark in a predetermined place
outsourcing
a arrangement by which one organization provides a service for another organization that chooses not to perform them in house
ownership
can classify networks
parallel implementation
Using both the old and new systems until it is evident that the new system performs correctly
passive search
type of social network organizations can implement
peer-to-peer network
Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
phased implementation
Implementing the new system in phases until it is evident that the new system performs correctly and then implementing the remaining phases of the new system
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as user-names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
Place Firewalls
Between the server and the Internet
primary changes and challenges organizations are focusing on in the 21st century
include innovation, social entrepreneurship, social networks, and virtual worlds
primary key
a field or group of fields that uniquely indentifies a given entity in a table
Project's timeframe is listed in a Gantt chart
horizontally
Protocol
The standards that specify the format of data as well as the rules to be followed during transmission
protocol
A standard that specifies the format of data as well as the rules to be followed during transmission
prototype
a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
Pure-Play Business
A business that operates on the Internet only without a physical store
Pure-Play Business
Business type describes Amazon.com
raw facts
data
Reintermediation
Refers to using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways
repeater
and example of a communication device
Replace characters with other characters
Can be completed by encryption
router
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
Sensitivity Analysis
A quantitative model typically used by a DSS
Shopping Bot
One of the simplest examples of an intelligent agent
size
can classify networks
Slice-and-Dice Capability
The ability to look at information from different perspectives
Sniffer
a program or device that can monitor data trveling over a network
Social Engineering
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
Software
The set of instructions that the hardware executes to carry out specific tasks
Something that is part of the user such as a fingerprint or voice signature
The most secure type of authentication
Something the user has such as a smart card or token
The most secure type of authentication
Something the user knows such as a user ID and password
The most secure type of authentication
Spoofing
The forging of the return address on an email so that the email message appears to come from someone other than the actual sender
Switch the order of characters
Can be completed by encryption
system
a collection of elements organized to perform some task or achieve a goal.
System Software
Controls how the various technology tools work together along with the application software
systems development life cycle
The overall process for developing information systems from planning and analysis through implementation and maintenance
testsing
phase in SDLC
to create logical relationships
relational databases use primary keys and foriegn keys
topology
can classify networks
Touch Pad
A form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move
twisted pair
a type of communication media
Use a mathematical formula to convert the information into some sort of code
Can be completed by encryption
Utility Software
Provides additional functionality to the operating system
Viral Marketing
A technique that induces websites or users to pass on a marketing message to other websites or users
Virtual private network
a way to use the public telecommunication structure to provide secure access to an organization's network
Virtualization
A protected memory space created by the CPU allowing the computer to create virtual machines
VoIP
uses TCP/IP technology to transmit voice calls over long distance telephone lines
VoIP routes
calls through the same paths used by network and Internet traffic, therefore it has the same vulnerabilities and is subject to the same Internet threats.
What-If Analysis
A quantitative model typically used by a DSS
wide area network
spans a large geographic area, such as a state, province, or country
WiFi
a type of communication media
Word Length
The number of bits (0s and 1s) that can be processed by the CPU at any one time
Workstation
Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time
World Wide Web
A global hypertext system that uses the Internet as its transport mechanism