• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Executive Information Systems

Used by strategic level executives to analyse, compare and identify trends and outcomes.


-uses external information


-"drills" information from DPS, MIS and DSS


-highly sumarised & graphical output


-high level of technical support


-summarised from DPS, MIS and DSS

Expert systems

Special Computer Program that has;


-lots of information on a certain topic


-performs tasks otherwise done by human experts and has been supplied -with knowledge from human experts


Made of 3 parts:


1. Knowledge base (a big data base with rules built in)


2. A program (inference engine / expert system shell)


3. Explanatory Interface (The screen the user sees)

Client-Server

Clients make use of resources on one or more servers.


Advantages:


-Better Security


-Access levels


-Control resources on servers


Disadvantages:


-Expense

Data Privacy

Data Privacy is an Individuals right to be secure from unauthorised disclsure of information about them stored in documents and computer files.



Organisations have a duty to protect the privacy of their datawhich they holf about members of the public and their staff, and to process this data only in the manner for which it was intended.

Data security

Level of protection your data has from unauthorised access, and failure of hardware and software.



Unauthorised acces can be from eithin ot outwith the organisation, intentional or unintentional. There are a number of methods which can be used to prevent or reduce the risk of unauthorised access.

Denial of Service

An attempt by attackers to prevent legitimate users from using network services.



Examples are;


-Flooding a network or server


-Disrupting connections between machines


-Oreventing individuals from accessing a service

IT Code of Conduct

Most organisations have a code of conduct, these are the guidlines towards what you can and can not do on the computers.

Future proof

Ensuring your hardware and software has a life span of at least 3-5 years.



Computer & communication technology develops at an incredible rate, and future proofing requires an organisation to attempt to anticipate future developments in order to secure resources which ill be compatible with them.

Functionality and Portability

Portability- the software has the ability to run on a variety of computers. "Portable" and "machine independent" mean the same thing- that the software does not depend on a particular type of hardware.



Functionality- What a product, such as a software application or computing device can do for a user.

Software Emulator

An emulator is hardware or software or both that duplicates (or emulates) the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).

Incremental backups

An incremental backup is one that provides a backup of files that have changed or are new since the last incremental backup;


it is one that backs up only the data that changed since the last backup — be it a full or incremental backup

Back up strategy

A backup is a copy of files on a second medium (a disk or tape) as a precuation in case the first medium fails.


One of the cardinal rules in using compuets is "Back up your files regularly".


Even the most realiable computer will break down eventually.


Many proffessionals recommend all that oganisations and individuals make two, or even three, backups of all their files

Supporting users with upgrades

As organisations develop over time, additional hardware and software resorcesare required and older resources need replaced.



An organisation's upgrade strategy determines how these new and replacement resources will be provided, developed and tested.