• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back
Executive level
The top level of the organization, where executives focus on long term strategic issues facing the organization
Functional Informational Systems
A cross-organizational level information system designed to support a specific function area
Expert Systems
-A special purpose IS designed to mimic human expertise by manipulating knowledge
-Understanding acquired through experience and extensive learning rather than simply information
Decision Support
A special purpose IS designed to support organizational decision making
Destructive agent
Malicious agents designed by spammers and other internet attackers to farm e-mail addresses off web sites or deposit spyware on machines
Customizable CRM
(customer relationship management). A corporate level strategy designed to create and maintain lasting relationships with customers by concentrating on the down stream information flows, through the introduction of reliable systems, processes, and procedures
Sale Force Automation
SFA: CRM (customer relationship management) systems to support the day to day sales activities of an organization
Enterprise Systems
IS that allow companies to integrate information across operations on a company-wide basis
Stand-Alone Applications
Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization
Legacy Systems
Older stand-alone computer systems within an organization with older versions of applications that are either fast approaching or beyond the end of their useful life within the organization
Software engineering
A disciplined approach for constructing IS through the use of common methods, techniques, or tools
Preventive
Making changes to a system to reduce the chance of future system failure
Forms and reports
Forms:
1. A collection of blank entry boxes, each representing a field, that used to enter info into a database
2. A business document that contains some predefined data and may include some areas where additional data is to be filled in, typically for a single record

Report: A compilation of data from a database that is organized and produced in printed format
RAD
Rapid Application development: A four phase systems development methodology that combines prototyping, computer based development tools, special management practices, and close user involvement
External Acquisition
The process of purchasing an existing information system from an external organization or vender
Object-oriented analysis and design
systems development methodologies and techniques based on objects rather than on data and process
Logical bomb
A virus that only targets certain people
EX: people who have been fired from a company
Line of sight
VQ: A big advantage of RFID is that reading an RFID tap doesnt require a line of sight
Time related sweet spot
VQ: all forms of data have a time-related sweet spot where information creates the greatest value.
-data becomes old and outdated over time
Napster
The owner of the UK itunes URL redirected his link to Napster, Apple is top competitor
Cracker
An individual who breaks into computer systems with intention of doing damage or committing crime
Computer crime
the use of a computer to commit an illegal act
Identity theft
stealing of another persons social security #, credit card #, and other personal info, for the purpose of using the victims credit rating, borrow money, buy merchandise and otherwise run up debts that are never paid
Salami slicing
A form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them into personal accounts
Software piracy
A type of computer crime where individuals make illegal copies of software protected by copyright laws
phreaking
crimes committed against phone companies computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpetrators choice, or otherwise disputing telephone service for subscribers
Prototyping
A systems development process in which requirements are converted into a working system that is continually revised through close work between analysts and users
Information accessibility
an ethical issue concerned with the authenticity and fidelity of info, as well as identifying who is responsible for informational errors that harm people
Time bomb
A virus designed to enable at a certain time
EX: april fools virus
Operational (level)
Purpose-processing of business events and transactions
Increasing efficiency: automation lowers costs
Example: payroll processing, sales order processing, inventory management
Sales and order process
operational level
Document preparation and scheduling
office automation systems
-word processing, email, electronic calendar
Written 3rd party vendors
-packaged application
-enterprise application
Direct
-new system conversion, happens instantly (Installation of a new system)
Analysis Phase
phase 2: system analysis
-designers gain understanding of current process
Beta
testing the capabilities of the system in the user environment with actual data
Digital divide
Gap between generations understanding technologies
SDLC
systems development life cycle. Describes the life of an information system from conception to retirement
Steps in the Systems Development Process
1. system identification, selection, planning
2. system analysis
3. system design
4. system implimentation
5. system maintenance