flashcards

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems

A

A coordinated set of components for collecting, storing, and processing data and delivering information, knowledge, and digital products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ERP (Enterprise Resource Planning)

A

Integrated software systems used to manage and automate core business processes across various departments in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPS (Transaction Processing System)

A

A system that collects, stores, modifies, and retrieves the data transactions of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CRM (Customer Relationship Management)

A

A strategy and software system used to manage interactions with current and potential customers, aiming to improve relationships and business outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy Systems

A

Older computer systems or applications that are still in use, often due to their critical role in business operations, despite being outdated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCMS (Supply Chain Management Systems)

A

Software solutions that facilitate the management of supply chain activities, from procurement to production to distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MIS (Management Information Systems)

A

Systems that provide managers with tools to organize, evaluate, and manage departments within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSS (Decision Support System)

A

Computer-based information systems that support decision-making activities by analyzing data and presenting actionable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EIS (Executive Information System)

A

A specialized DSS designed to help executives make strategic decisions by providing easy access to internal and external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sustaining Information Systems

A

Systems that support ongoing operations and maintenance of an organization’s current business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Strategic Information Systems

A

Systems that provide a competitive advantage by helping organizations achieve strategic goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IS Reference Disciplines

A

Various academic fields that contribute to the study and practice of Information Systems, including computer science, management science, and economics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPU (Central Processing Unit)

A

The primary component of a computer that performs most of the processing inside a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computational Speed

A

The rate at which a computer or processing unit can execute instructions and perform calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HDD vs. SSD

A

HDD (Hard Disk Drive) uses spinning disks for storage, while SSD (Solid State Drive) uses flash memory, offering faster data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Primary vs. Secondary Storage

A

Primary storage is fast and temporary (e.g., RAM), while secondary storage is slower but long-term (e.g., HDD, SSD).

18
Q

Volatile vs. Non-Volatile

A

Volatile memory requires power to maintain data (e.g., RAM), while non-volatile memory retains data without power (e.g., ROM).

19
Q

RAM (Random Access Memory)

A

A type of volatile memory that stores data actively being used by the CPU.

20
Q

ROM (Read-Only Memory)

A

Non-volatile memory that is permanently programmed with data and retains it even when the power is off.

21
Q

Cloud Services

A

Services delivered over the internet, allowing access to data and applications remotely, including IaaS, PaaS, and SaaS.

22
Q

Guided Network Media

A

Communication medium using physical conduits to transmit data, such as twisted pair and fiber optic cables.

23
Q

Network Protocols

A

Rules and conventions for transmitting data over a network, such as TCP/IP and HTTP.

24
Q

Network Bandwidth

A

The maximum rate of data transfer across a network connection, measured in bits per second.

25
Q

IP Address

A

A unique identifier assigned to each device on a network that uses the Internet Protocol for communication.

26
Q

Ping

A

A network utility used to test the reachability of a host and measure round-trip time for messages.

27
Q

HTTP (Hypertext Transfer Protocol)

A

A protocol for transmitting hypertext via the World Wide Web, facilitating communication between browsers and servers.

28
Q

VPN (Virtual Private Network)

A

A technology that creates a secure and encrypted connection over the internet for privacy and security.

29
Q

Firewall

A

A network security device that monitors and controls incoming and outgoing network traffic based on security rules.

30
Q

CIA Triad

A

A model focusing on three key principles: Confidentiality, Integrity, and Availability in information security.

31
Q

2FA (Two-Factor Authentication)

A

A security process requiring two forms of identification to verify a user’s identity.

32
Q

DoS and DDoS Attacks

A

DoS (Denial of Service) attacks overwhelm a target with traffic, while DDoS (Distributed Denial of Service) uses multiple compromised systems.

33
Q

Encryption

A

A process that transforms data into a coded format to prevent unauthorized access.

34
Q

Malware Types

A

Various malicious software forms, including viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

35
Q

Authentication

A

The process of verifying the identity of a user, device, or system before granting access to resources.

36
Q

Authorization

A

The process of granting permission to a user to access specific resources after their identity has been authenticated.

37
Q

System Vulnerabilities

A

Weaknesses in a system that can be exploited by attackers to gain unauthorized access or cause harm.

38
Q

Network Sniffing

A

The practice of monitoring and capturing data packets traveling over a network, which can be used for legitimate or malicious purposes.

39
Q

Checksums

A

A value calculated from data to verify its integrity during transmission or storage.

40
Q

AI Ethics, Privacy, and Security

A

Concerns regarding the moral implications of AI, individual privacy rights, and the security of AI systems.

41
Q

Malicious and Non-Malicious Insiders

A

Malicious insiders exploit access for harm, while non-malicious insiders cause breaches inadvertently through negligence.