Chapter 14 Flashcards
Application Service Provider (ASP)
outside supplier that provides both the computers and the application support for managing an information system.
Big Data
information collected in massive amounts and at unprecedented speed from both traditional and digital sources that is used in business decision making; complex structured or unstructured sets of information that traditional processing applications are unable to analyze.
Botnet
a network of PCs that have been infected with one or more data-stealing viruses.
Chief Information Officer (CIO)
executive responsible for managing a company’s information system and related computer technologies.
Cloud Computing
powerful servers store applications software and databases for users to access via the web using anything from a PC to a smart phone.
Computer-Based Information Systems
information systems that rely on computer and related technologies to store information electronically in an organized, accessible manner.
Data
raw facts and figures that may or may not be relevant to a business decision.
Database
centralized integrated collection of data resources.
Decision Support System (DSS)
gives direct support to business-people during the decision-making process.
Enterprise Computing
many different types of hardware networked together to create a seamless data flow between organizations.
Executive Support System (ESS)
lets senior executives access the company’s primary databases, often by touching the computer screen, pointing and clicking a mouse, or using voice recognition.
Expert System
computer program that imitates human thinking through complicated sets of if-then rules.
Firewall
limits data transfers to certain locations and log system use so that managers can identify attempts to log on with invalid passwords and other threats to a system’s security.
Grid Computing
consists of a network of smaller computers running special software.
Hardware
all tangible elements of a computer system.
Information
knowledge gained from processing data.
Information System
organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.
Internet of Things
a web-connected ecosystem of everyday objects with network connectivity, including TVs, cars, household appliances, and wearable tech devices.
Intranet
computer network that is similar to the Internet but limits access to authorized users.
Local Area Networks (LANs)
computer networks that connect machines within limited areas, such as a building or several nearby buildings.
Malware
any malicious software program designed to infect computer systems.
Management Information System (MIS)
information system that is designed to produce reports for managers and others within the organization.
Management Support Systems
information systems that are designed to provide support for effective decision making.
Operational Support Systems
information systems designed to produce a variety of information on an organization’s activities for both internal and external users.
Process Control Systems
operational support system to monitor and control physical processes.
Server
the heart of a midrange computer network.
Software
all the programs, routines, and computer languages that control a computer and tell it how to operate.
Spyware
software that secretly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes.
Transaction Processing Systems
operational support system to record and process data from business transactions.
Trojan Horse
program that claims to do one thing but in reality does something else, usually something malicious.
Virtual Network
common type of technology infrastructure, which consists of links that are not wired connections.
Virtual Private Network
secure connections between two points on the Internet.
Viruses
programs that secretly attach themselves to other programs (called hosts) and change them or destroy data.
VoIP
alternative to traditional telecommunication services provided by companies such as Verizon and Qwest.
Wide Area Networks (WAN)
tie larger geographical regions together by using telephone lines and microwave and satellite transmission.
Wi-Fi
wireless network that connects various devices and allows them to communicate with one another through radio waves.
Worm
small piece of software that exploits a security hole in a network to replicate itself.