Exam 1 Flashcards

1
Q

Computer-based information systems (CBIS)

A

An information system that uses computer technology to perform some or all of its intended tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data items

A

An elementary description of things, events, activities, and transactions that are recorded, classified, and sorted but are not organized to convey any meeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

enterprise resource planning (ERP) systems

A

information systems that correct a lack of communication among the functional area ISs by tightly integrting the functional area ISs via common database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

functional area information systems (FAISs)

A

ISs that support a particular functional area within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hardware

A

a device such as a processor, monitor, keyboard, or printer Together these devices accept, process, and display data and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information

A

data that have been organized so that they have meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

information systems (IS)

A

collects, processes, stores, analyzes, and disseminates information for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

information technology (IT)

A

relates to any computer-based tool that people use to work with information and support the information and information-processing needs of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

information technology components

A

hardware, software, databases, and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

interorganizational information systems (IOS)

A

information systems that connect two or more organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

knowledge

A

data and/or info that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

knowledge workers

A

professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are expert in a particular subject area and create information and knowledge, which they integrate into business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

procedures

A

the set of instructions for combining hardware, software, database, and network components in order to process info and generate the desired output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software

A

a program or collection of programs that enable the hardware to process data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

transaction processing system (TPS)

A

supports the monitoring, collection, storage, and processing of data from the organization’s basic business transaction, each of which generates data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

business environment

A

the combination of social, legal, economic, physical, and political factors in which businesses conduct their operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business-information technology alignment

A

the tight integration of the IT function with the strategy, mission, and goals of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

business process

A

a collection of related activities that produce a product or service of value to the organization, its business partners, and or its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

business process management (BPM)

A

a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

business process reengineering (BPR)

A

a radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a “clean sheet”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

competitive forces model

A

a business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company’s position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

cross-functional business process

A

a process in which no single functional area is responsible for its completion; multiple functional areas collaborate to perform the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

digital divide

A

the gap between those who have access to information and communications technology and those who do not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

entry barrier

A

product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

globalization

A

the integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

mass customization

A

a production process in which items are produced in large quantities but are customized to fit the desires of each customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

organizational social responsibility

A

efforts by organizations to solve various social problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

primary activities

A

those business activities related to the production and distribution of the firm’s products and services, thus creating value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

strategic information systems (SIS)s

A

systems that help an organization gain a competitive advantage by supporting its strategic goals and or increasing performance and productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

support activities

A

business activities that do not add value directly to a firm’s product or service under consideration but support the primary activities that do add value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

value chain model

A

model that shows the primary activities that sequentially add value to the profit margin; also shows the support activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

value system

A

includes the producers, suppliers, distributors, and buyers, all with their value chains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

code of ethics

A

a collection of principles intended to guide decision making by members of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

digital dossier

A

an electronic description of an individual and his or her habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

information privacy

A

the right to determine when, and to what extent, personal information can be gathered by and or communicated by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

liability

A

a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

opt-in model

A

a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

opt-out model

A

a model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

profiling

A

the process of forming a digital dossier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

responsibility

A

a tenet of ethics in which you accept the consequences of your decisions and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

access controls

A

controls that restrict unauthorized individuals from using information resources and are concerned with user identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

adware

A

alien software designed to help pop-up advertisements appear on your screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

alien software

A

clandestine software that is installed on your computer through duplicitous methods

44
Q

anti-malware systems

A

software packages that attempt to identify and eliminate viruses, worms, and other malicious software

45
Q

audit

A

an examination of information systems, their inputs, outputs, and processing

46
Q

back door

A

typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security proceedures

47
Q

biometrics

A

the science and technology of authentication by measuring the subject’s physilogic or behavioral characteristics

48
Q

blacklisting

A

a process in which a company identifies certain types of software that are not allowed to run in the company environment

49
Q

certificate authority

A

a third party that acts as a trusted intermediary between computers by issuing digital certificates and verifying the worth and integrity of the certificates

50
Q

cold site

A

a backup location that provides only rudimentary services and facilities

51
Q

controls

A

defense mechanisms

52
Q

cookie

A

small amounts of information that Web sites store on your computer, temporarily or more or less permanently

53
Q

copyright

A

a grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.

54
Q

cybercrime

A

illegal activities executed on the internet

55
Q

cyberterrorism

A

can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups

56
Q

cyberwarfare

A

war in which a country’s information systems could be paralyzed from a massive attack by destructive software

57
Q

demilitarized zone (DMZ)

A

a separate organizational local area network that is located between an organization’s internal network and an external network, usually the internet.

58
Q

denial-of-service attack

A

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.

59
Q

distributed denial-of-service (DDoS) attack

A

attack that sends a flood of data packets from many compromised computers simultaneously

60
Q

digital certificate

A

an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format of content.

61
Q

exposure

A

the harm, loss, or damage that can result if a threat compromises an information resource

62
Q

firewall

A

a system that prevents a specific type of information from moving between untrusted networks, such as the internet and private networks, such as tour company’s network.

63
Q

hot sites

A

a fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicated your company’s computing resources and provides near real-life recovery of IT operations.

64
Q

information security

A

protecting an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

65
Q

intellectual property

A

the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.

66
Q

least privilege

A

a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization

67
Q

logic bombs

A

segments of computer code embedded within an organization’s existing computer programs

68
Q

malware

A

malicious software such as viruses or worms

69
Q

phishing attack

A

an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking email.

70
Q

physical controls

A

controls that restrict unauthorized individuals from gaining access to a company’s computer facilities

71
Q

piracy

A

copying a software program without making payment to the owner

72
Q

privilege

A

a collection of related computer system operations that can be performed by users of the system.

73
Q

public-key encryption

A

a type of encryption that uses two different keys, a public key and a private key.

74
Q

risk acceptance

A

a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.

75
Q

risk analysis

A

the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised and compares the probable costs of each being compromised with the costs of protecting it

76
Q

risk limitation

A

a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.

77
Q

risk management

A

a process that identifies, controls, and minimizes the impact of threats, in an effort

78
Q

risk mitigation

A

a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan

79
Q

risk transference

A

a process in which the organization transfers the risk by using other means to compensate for a loss such as purchasing insurance

80
Q

secure socket layer (SSL)

A

an encryption standard used for secure transactions such as credit card purchases and online banking

81
Q

security

A

the degree of protection against criminal activity, danger, damage, and or loss

82
Q

social engineering

A

getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorzed

83
Q

spam

A

unsolicited email

84
Q

spamware

A

alien software that uses your computer as a launch platform for spammers

85
Q

spyware

A

alien software that can record your keystrokes and or capture your passwords

86
Q

trade secret

A

intellectual work, such as a business plan, that is a company secret and is not based on public information

87
Q

Trojan horse

A

a software program containing a hidden function that presents a security risk

88
Q

tunneling

A

a process that encrypts packet inside another packet

89
Q

virtual private network (VPN)

A

a private network

90
Q

viruses

A

malicious software that can attach itself to other computer programs without the owner of the program being aware of the infection

91
Q

vulnerability

A

the possibility that an information resource will be harmed by a threat

92
Q

whitelisting

A

a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity

93
Q

worms

A

destructive programs that replicate themselves without requiring another program to provide a safe environment for replication

94
Q

Identify several ways in which you depend on information technology in your daily life

A

texting, email, research, shop, pay bills

95
Q

What are three ways in which information technology can impact managers

A
  1. may reduce middle managers
  2. less time to make decisions
  3. increase likelihood of having to supervise geographically
96
Q

What are three ways in which information technology can impact nonmanagerial workers

A
  1. may eliminate jobs
  2. may cause employees to feel a loss of identity
  3. cause job stress and repetitive stress injury
97
Q

List three positives and three negatives societal effects of the increased use of IT

A

positive: 1. opportunities for disabled people 2. work flexibility 3. improvements in healthcare
negative: 1. cause health problems 2. place employees on constant call 3. misinform patients about their health problems

98
Q

List and provide examples of the three types of business pressures, and describe one IT response to each.

A
  1. Market pressures: powerful customers
  2. Technology pressures: info overload
  3. societal/political/legal pressures: social responsibility (environment)
99
Q

Identify 5 competitive forces

A
  1. threat of new competitors
  2. bargaining power of suppliers
  3. bargaining power of customers
  4. threat of substitute products
  5. rivalry amongst existing firms in industry
100
Q

5 strategies to counter competitive forces

A
  1. cost leadership strategy- lowest cost
  2. differentiation strategy- different products or services
  3. innovation strategy- introduce new products and services
  4. operational effectiveness strategy- improve internal business processes
  5. customer-orientation strategy- focus on customer’s happiness
101
Q

List 3 fundamental tenets of ethics

A
  1. responsibility
  2. accountability
  3. liability
102
Q

List 4 categories of ethical issues related to information technology

A
  1. privacy
  2. accuracy
  3. property
  4. access to information
103
Q

Identify three places that store data and discuss one personal threat to the privacy of the data stored there.

A

databases, forums, and social networking sites. the threat is you might post too much that unknown people can see.

104
Q

Identify 5 factors that contribute to vulnerability of information resources and provide an example of each

A
  1. interconnected, wirelessly networked-internet
  2. smaller, faster, cheaper, computers and storage devices- ipads thumbdrives
  3. decreasing skills necessary to hack-hacking programs on the internet
  4. international organized crime taking over cybercrime-cartels
  5. lack of management support
105
Q

10 types of deliberate attacks

A
  1. espionage or trespass
  2. information extortion
  3. sabotage and vandalism
  4. theft of equipment
  5. identity theft
  6. protecting intellectual property
  7. software attacks
  8. alien software
  9. supervisory control and data acquisition
  10. cyberterrorism or cyberwarfare
106
Q

Identify three major types of controls that organization can use to protect their information resources.

A
  1. physical controls
  2. access controls
  3. communication controls