Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
29 Cards in this Set
- Front
- Back
Entity |
Any Object about which an organization chooses to collect data. |
|
Field |
A data element in a record, describing one aspect of an entity or event. |
|
Primary Key |
In a file, a field that holds values that are unique to each record. |
|
Structured Query Language(SQL) |
The data definition and manipulation language of choice for many developers of relational database management systems. |
|
Schema |
The structure of a database, detailing the names and types of fields in each set of records and the relationship among sets of records. |
|
HTTPS |
The secure version of HTTP |
|
Hypertext Markup Language (HTML) |
A programming language for web pages and web browsers |
|
File Transfer Protocol (FTP) |
Software that allows the transfer of files over communication lines. |
|
Really Simple Syndication (RSS) |
a type of application using XML fir aggregating updates to blogs and news posted at web sites |
|
Cookie |
A small file that a web site places on a visitor’s disk so that the web site can remember something about the visitor later, such as an ID number or username |
|
Load Balancing |
The transfer of visitor inquires from a busy server to a less busy server |
|
Glocalization |
The planning and designing of global Web sites so that they also cater to local needs and preferences |
|
Safe Harbor |
A list of U.S. companies that have agreed to conform to European Union data protection laws with regards to EU citizens |
|
Systems development life cycle (SDLC) |
The oldest method of developing an information system, consisting of several phases of analysis and design, which must be followed sequentially |
|
Feasibility studies |
A series of studies conducted to determine if a proposed information system could be built |
|
Return on investment (ROI) |
a financial calculation of the difference between the stream of benefits and the stream of costs over the life on an information system |
|
System Requirements |
The functions that an information system is expected to fulfill and the features through which it will perform its task |
|
Outsourcing |
Buying the services on an information service firm that undertakes some or all of the organization’s IS operations
|
|
Offshoring |
Outsourcing work to employees in other countries |
|
Service-Level Agreement |
A document that lists all the types of services expected of an outstanding vendor as well as the metrics that will be used to measure the degree to which the vendor has met the level of promised services |
|
Bata Site |
An organization that agrees to use a new application for a specific period and reports errors and unsatisfactory featured to the developer in return for free use and software |
|
Uptime |
The percentage of time (so much time per year) that an information system is in full operation |
|
Blackouts and Brownouts |
Periods of power loss or a significant fall in power |
|
Uninterruptible power supply (UPS) |
A device that provides an alternate power supply as soon as a power network fails. |
|
Social Engineering |
Deceptive methods that hackers use to entice people to release confidential information such as access codes and passwords. |
|
Honeypot |
A duplicated database on a server connected to the Internet to trace an intruder |
|
Firewall |
Hardware and software designed to control access by internet surfers to an information system, and access to Internet sites by organizational users |
|
Encryption |
The conversion of plain text to an unreadable stream of characters, especially to prevent a party the intercepts telecommunicated messages from reading them. |
|
HTTPS |
Secure version of HTTP
|