Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
136 Cards in this Set
- Front
- Back
AI Technologies
|
Can be used to decrease the cost of surveillance
|
|
ALU
|
part of a CPU
|
|
analysis
|
phase in SDLC
|
|
anaylsis
|
phase of the SDLC gathers business requirements
|
|
anaylsis phase of SDLC
|
Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
|
|
Antivirus software
|
the most common type of defense within detection and response technologies
|
|
API
|
a set of routines, protocols, and tools for building software applications
|
|
Application Software
|
Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
|
|
Arithmetic Logic Unit (ALU)
|
Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)
|
|
Assumes users can specify all business requirements in advance
|
an issue related to the waterfall methodology
|
|
Authentication
|
A method for confirming users' identities
|
|
Bandwidth
|
a measure of how much information can be carried over communication media
|
|
boomerangs
|
types of social networks organizations can implement
|
|
Botnets
|
Some are controlled by foreign intelligence agencies
|
|
Brick-and-Mortar Business
|
A business that operates in a physical store without an Internet presence
|
|
BUS
|
a network topology
|
|
Bus Width
|
The size of the internal electrical pathway along which signals are sent from one part of the computer to another
|
|
Business Process
|
A standardized set of activities that accomplish as specific task, such as processing a customer's order
|
|
Central Processing Unit (CPU) (Microprocessor)
|
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
|
|
Click-and-Mortar Business
|
A business that operates in a physical store and on the Internet
|
|
client
|
A computer that is designed to request information from a server
|
|
Communication protocol
|
a standard (or agreement) to communicate in a specific way
|
|
Complex Instruction Set Computer (CISC) Chip
|
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
|
|
compliance
|
the act of conforming, acquiescing or yeilding
|
|
computer memory
|
usually divided into primary and secondary
|
|
Content Providers
|
Companies that use the Internet to distribute copyrighted content, including news, music, games, books, movies, and many other types of information
|
|
control unit
|
part of a CPU
|
|
Data Management
|
Provides the tools for data retrieval, modification, deletion, and insertion
|
|
data mining
|
process of analyzing data to extract info not offered by the raw data alone
|
|
data warehouse
|
a logical colletion of info-gathered from many different operational databases- that supports business analysis activities and decision making task
|
|
Decision-Making Information Systems
|
Build models out of organizational information to lend insight into important business issues and opportunities
|
|
design
|
phase in SDLC
|
|
design phase in SDLC
|
Involves describing the desired features and operations of the system
|
|
Digital Dashboard
|
Integrates information from multiple components and tailors the information to individual preferences
|
|
Disk Optimization
|
Organizes information on a hard disk in the most efficient way
|
|
Drill-Down Capability
|
Enables users to get details, and details of details, of information
|
|
early computers
|
were made with vacuum tubes that failed often
|
|
elecronic tagging
|
a technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards
|
|
Encryption
|
Scrambles information into an alternative form that requires a key or password to decrypt the information
|
|
enforcement of copyright
|
harder in peer-to-peer
|
|
Entity
|
person, place, thing, transaction, or eventabout which infromation is stored in the relational database model
|
|
Expert Systems
|
The most commonly used form of AI in the business arena
|
|
feasability study
|
Determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint
|
|
fiber opticals
|
a type of communication media
|
|
Files Stored on a Internet Web Site
|
Do not have the same legal protection as files stored on your home computer
|
|
Firewalls
|
Examines each message that wants entrance to the network
|
|
Firewalls
|
Blocks messages without the correct markings from entering the network
|
|
Firewalls
|
Detects computers communicating with the Internet without approval
|
|
Flaws in accurately defining and articulating the business problem
|
an issue related to the waterfall methodology
|
|
foriegn key
|
a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship amoung 2 tables
|
|
Fourth Amendment
|
Protects privacy rights
|
|
Genetic Algorithm
|
An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
|
|
Goal of AI
|
The ability to build a system that can mimic human intelligence
|
|
Goal-Seeking Analysis
|
A quantitative model typically used by a DSS
|
|
Hardware
|
Consists of the physical devices associated with a computer system
|
|
Hypertext Transport Protocol
|
The Internet standard that supports the exchange of information on the WWW
|
|
implementationi phase in SDLC
|
Involves placing the system into production so users can begin to perform actual business operations with the system
|
|
In a Gantt chart Tasks are listed in a Gantt chart
|
vertically
|
|
increased revenues
|
a business-related consequence of successful software
|
|
input
|
data
|
|
Input Device
|
Equipment used to capture information and commands
|
|
Intelligent Agent
|
A special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users
|
|
Intermediaries
|
Agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance E-business
|
|
Internet
|
A global public network of computer networks that pass information from one to another using common computer protocols
|
|
Internet Service Provider (ISP)
|
A company that provides individuals and other companies access to the Internet along with additional related services, such as website building
|
|
IT
|
the most common function outsourced
|
|
LinkedIn
|
the name of the largest social networking site for business professional recruiters
|
|
lower level languages
|
closer to what the computer can actually understand than higer level langauges.
|
|
Magnetic Tape
|
An older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium
|
|
Malicious Code
|
Includes a variety of threats such as viruses, worms, and Trojan horses
|
|
Managing costs, resources, and time constraints
|
an issue related to the waterfall methodology
|
|
Market Makers
|
Intermediaries that aggregate three services for market participants (1) a place to trade, (2) rules to govern trading, and (3) an infrastructure to support trading
|
|
marketing networks
|
types of social networks organizations can implement
|
|
Megabyte (MB) (M) (Meg)
|
Roughly 1 million bytes
|
|
Megahertz (MHz)
|
The number of millions of CPU cycles per second
|
|
Modem
|
used to change a digital signal to an analog signal and back again
|
|
Multiply by number of switches by 2; Square Answer
|
To find how many switches could represnt patterns of 0s and 1s
|
|
network
|
a communications, data exchange, and resource-sharing system created by linking 2 or more computers and establishing standards. or protocols, so that they can work together
|
|
network database
|
database structure that offers a flexible way of representing objects and their relationships
|
|
Neural Network
|
A category of AI that attempts to emulate the way the human brain works
|
|
Online Brokers
|
Acts as an intermediary between buyers and sellers of goods and services
|
|
Optical-Mark Recognition
|
Detects the presence or absence of a mark in a predetermined place
|
|
outsourcing
|
a arrangement by which one organization provides a service for another organization that chooses not to perform them in house
|
|
ownership
|
can classify networks
|
|
parallel implementation
|
Using both the old and new systems until it is evident that the new system performs correctly
|
|
passive search
|
type of social network organizations can implement
|
|
peer-to-peer network
|
Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
|
|
phased implementation
|
Implementing the new system in phases until it is evident that the new system performs correctly and then implementing the remaining phases of the new system
|
|
Phishing
|
The criminally fraudulent process of attempting to acquire sensitive information such as user-names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
|
|
Place Firewalls
|
Between the server and the Internet
|
|
primary changes and challenges organizations are focusing on in the 21st century
|
include innovation, social entrepreneurship, social networks, and virtual worlds
|
|
primary key
|
a field or group of fields that uniquely indentifies a given entity in a table
|
|
Project's timeframe is listed in a Gantt chart
|
horizontally
|
|
Protocol
|
The standards that specify the format of data as well as the rules to be followed during transmission
|
|
protocol
|
A standard that specifies the format of data as well as the rules to be followed during transmission
|
|
prototype
|
a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
|
|
Pure-Play Business
|
A business that operates on the Internet only without a physical store
|
|
Pure-Play Business
|
Business type describes Amazon.com
|
|
raw facts
|
data
|
|
Reintermediation
|
Refers to using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways
|
|
repeater
|
and example of a communication device
|
|
Replace characters with other characters
|
Can be completed by encryption
|
|
router
|
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
|
|
Sensitivity Analysis
|
A quantitative model typically used by a DSS
|
|
Shopping Bot
|
One of the simplest examples of an intelligent agent
|
|
size
|
can classify networks
|
|
Slice-and-Dice Capability
|
The ability to look at information from different perspectives
|
|
Sniffer
|
a program or device that can monitor data trveling over a network
|
|
Social Engineering
|
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
|
|
Software
|
The set of instructions that the hardware executes to carry out specific tasks
|
|
Something that is part of the user such as a fingerprint or voice signature
|
The most secure type of authentication
|
|
Something the user has such as a smart card or token
|
The most secure type of authentication
|
|
Something the user knows such as a user ID and password
|
The most secure type of authentication
|
|
Spoofing
|
The forging of the return address on an email so that the email message appears to come from someone other than the actual sender
|
|
Switch the order of characters
|
Can be completed by encryption
|
|
system
|
a collection of elements organized to perform some task or achieve a goal.
|
|
System Software
|
Controls how the various technology tools work together along with the application software
|
|
systems development life cycle
|
The overall process for developing information systems from planning and analysis through implementation and maintenance
|
|
testsing
|
phase in SDLC
|
|
to create logical relationships
|
relational databases use primary keys and foriegn keys
|
|
topology
|
can classify networks
|
|
Touch Pad
|
A form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move
|
|
twisted pair
|
a type of communication media
|
|
Use a mathematical formula to convert the information into some sort of code
|
Can be completed by encryption
|
|
Utility Software
|
Provides additional functionality to the operating system
|
|
Viral Marketing
|
A technique that induces websites or users to pass on a marketing message to other websites or users
|
|
Virtual private network
|
a way to use the public telecommunication structure to provide secure access to an organization's network
|
|
Virtualization
|
A protected memory space created by the CPU allowing the computer to create virtual machines
|
|
VoIP
|
uses TCP/IP technology to transmit voice calls over long distance telephone lines
|
|
VoIP routes
|
calls through the same paths used by network and Internet traffic, therefore it has the same vulnerabilities and is subject to the same Internet threats.
|
|
What-If Analysis
|
A quantitative model typically used by a DSS
|
|
wide area network
|
spans a large geographic area, such as a state, province, or country
|
|
WiFi
|
a type of communication media
|
|
Word Length
|
The number of bits (0s and 1s) that can be processed by the CPU at any one time
|
|
Workstation
|
Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time
|
|
World Wide Web
|
A global hypertext system that uses the Internet as its transport mechanism
|