GLOSSARY Flashcards

1
Q

Access Controls

A

Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accountability

A

A tenet of ethics that refers to determining who is responsible for actions that were taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

Alien software designed to help pop-up advertisements appear on your screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Agile development

A

A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alien software

A

Clandestine software that is installed on your computer through duplicitous methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-malware systems

A

(or antivirus software) Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application

A

(or app) A computer program designed to support a specific task or business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application controls

A

Security countermeasures that protect specific applications in functional areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application portfolio

A

The set of recommended applications resulting from the planning and justification process in application development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application service provider

A

An agent or vendor that assembles the software needed by enterprises and packages them with outsourced development, operations, maintenance, and other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application software

A
Application software
The class of computer instructions that directs a computer system to perform specific processing activities and provide functionality for users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Arithmetic logic unit

A

Portion of the CPU that performs the mathematical calculations and makes logical comparisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute

A

Each characteristic or quality of a particular entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Auction

A

A competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers, and prices are determined dynamically by competitive bidding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Audit

A

The accumulation and evaluation of evidence that is used to prepare a report about the information or controls that are being examined, using established criteria and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Augmented reality

A

A live, direct or indirect, view of a physical, real-world environment whose elements are enhanced by computer-generated sensory input such as sound, video, graphics, or GPS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication

A

A process that determines the identity of the person requiring access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authorization

A

A process that determines which actions, rights, or privileges the person has, based on verified identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Back door

A

(or trap door) Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Banners

A

Electronic billboards, which typically contain a short text or graphical message to promote a product or a vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Best practices

A

The most effective and efficient ways to do things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Big Data

A

A collection of data so large and complex that it is difficult to manage using traditional database management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Binary relationship

A

A relationship that exists when two entities are associated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Biometrics

A

The science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject’s physiological or behavioural characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bit

A

Short for Binary digit (0s and 1s), the only data that a CPU can process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Blacklisting

A

A process in which a company identifies certain types of software that are not allowed to run in the company environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Blog

A

(or weblog) A personal website, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Blogosphere

A

The millions of blogs on the Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bot

A

(or zombie) A computer that has been compromised by, and is under the control of, a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Botnet

A

A network of computers that has been compromised by, and is under the control of, a hacker, who is called the botmaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Bricks-and-mortar organizations

A

Organizations in which the product, the process, and the delivery agent are all physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Business continuity planning

A

The chain of events linking planning to protection and to recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Business environment

A

The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Business intelligence system

A

A system that provides computer-based support for complex, nonroutine decisions, primarily for middle managers and knowledge workers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Business model

A

The method by which a company generates revenue to sustain itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Business process

A

A collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Business process improvement

A

An incremental approach to improving business processes. It looks for root causes to problems in process inputs, the process itself, or in process outputs, resulting in less radical and less disruptive business changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Business process management

A

A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Business process reengineering

A

A radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a “clean sheet” (i.e., from scratch).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Business rules

A

Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Business-information technology alignment

A

The tight integration of the IT function with the strategy, mission, and goals of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Business-to-business electronic commerce

A

Electronic commerce in which both the sellers and the buyers are business organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Business-to-consumer electronic commerce

A

Electronic commerce in which the sellers are organizations and the buyers are individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Business-to-employee electronic commerce

A

An organization using electronic commerce internally to provide information and services to its employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Buy-side marketplace

A

Business-to-business model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Byte

A

An 8-bit string of data, needed to represent any one alphanumeric character or simple mathematical operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Cache memory

A

A type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory (random access memory).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Cardinality

A

The uniqueness of data values with a column in a database. High cardinality means that the column has mostly unique values. Low cardinality means that the column has several “repeats” in its data range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Central processing unit (CPU)

A

Hardware that performs the actual computation or “number crunching” inside any computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Certificate authority

A

A third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Channel conflict

A

The alienation of existing distributors when a company decides to sell to customers directly online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Clicks-and-mortar organizations

A

Organizations that do business in both the physical and digital dimensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Clickstream data

A

Data collected about user behaviour and browsing patterns by monitoring users’ activities when they visit a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Cloud computing

A

A technology in which tasks are performed by computers physically removed from the user and accessed over a network, in particular the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Code of ethics

A

A collection of principles intended to guide decision making by members of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Collaborative consumption

A

Peer-to-peer sharing or renting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Communications controls

A

(or network controls) Controls that deal with the movement of data across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Competitive advantage

A

An advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Competitive forces model

A

A business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company’s position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Component-based development

A

A software development methodology that uses standard components to build applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Computer programs

A

The sequences of instructions for the computer, which comprise software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Computer-aided software engineering (CASE)

A

A software development approach that uses specialized tools to automate many of the tasks in the systems development life cycle; upper CASE tools automate the early stages of the life cycle and lower CASE tools automate the later stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Computer-based information system

A

An information system that uses computer technology to perform some or all of its intended tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Connectivity

A

The classification of a relationship: one-to-one, one-to-many, or many-to-many.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Consumer-to-consumer electronic commerce

A

Electronic commerce in which both the buyer and the seller are individuals (not businesses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Continuous application development

A

The process of steadily adding new computer code to a software project when the new computer code is ready.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Control environment

A

Controls that encompass management attitudes toward controls, as evidenced by management actions, as well as by stated policies and procedures that address ethical issues and the quality of supervision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Control unit

A

Portion of the CPU that controls the flow of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Controls

A

(or countermeasures) Defence mechanisms used to safeguard assets, optimize the use of the organization’s resources, and prevent or detect errors or fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Cookies

A

Small amounts of information that websites store on your computer, temporarily or more or less permanently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Copyright

A

A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 50 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Cross-functional business process

A

A process in which no single functional area is responsible for a process’s completion; multiple functional areas collaborate to perform the function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Cybercrime

A

Illegal activities executed on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Cybersquatting

A

Registering domain names in the hope of selling them later at a higher price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Cyberterrorism

A

A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Cyberwarfare

A

War in which a country’s information systems could be paralyzed from a massive attack by destructive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Dashboard

A

(or digital dashboard) A special form of IS that supports all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Data dictionary

A

A collection of definitions of data elements; data characteristics that use the data elements; and the individuals, business functions, applications, and reports that use these data elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Data file

A

(or table) A collection of logically related records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Data governance

A

An approach to managing information across an entire organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Data items

A

An elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Data mart

A

A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Data model

A

A diagram that represents entities in the database and their relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Data warehouse

A

A repository of historical data that are organized by subject to support decision makers in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Database

A

A collection of related files or tables containing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Database management system (DBMS)

A

The software program (or group of programs) that provides access to a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Demilitarized zone

A

A separate organizational local area network that is located between an organization’s internal network and an external network, usually the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Denial-of-service attack

A

A cyberattack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Digital certificate

A

An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Digital divide

A

The gap between those who have access to information and communications technology and those who do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Digital dossier

A

An electronic description of an individual and his or her habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Digital wallet

A

An application used for making online payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Direct conversion

A

A systems implementation process in which the old system is cut off and the new system is turned on at a certain point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Disintermediation

A

Elimination of intermediaries in electronic commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Distributed denial-of-service attack

A

A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Documentation

A

Written description of the functions of a software program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

E-government

A

The use of electronic commerce to deliver information and public services to citizens, business partners, and suppliers of government entities, and those working in the public sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

E-procurement

A

Purchasing by using electronic support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Electronic banking

A

(or cyberbanking) Various banking activities conducted electronically from home, a business, or on the road instead of at a physical bank location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Electronic business

A

(or e-business) A broader definition of electronic commerce, including buying and selling of goods and services, and servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Electronic commerce

A

(or EC or e-commerce) The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Electronic commerce systems

A

A type of interorganizational information system that enables organizations to conduct transactions, called business-to-business electronic commerce, and customers to conduct transactions with businesses, called business-to-consumer electronic commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Electronic mall

A

(or cybermall or e-mall) A collection of individual shops under one Internet address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Electronic marketplace

A

A virtual market space on the Web where many buyers and many sellers conduct electronic business activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Electronic payment mechanisms

A

Computer-based systems that allow customers to pay for goods and services electronically, rather than writing a cheque or using cash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Electronic retailing

A

(or e-tailing) The direct sale of products and services through storefronts or electronic malls to the end customer, usually designed around an electronic catalogue format and/or auctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Electronic storefront

A

The website of a single company, with its own Internet address, at which orders can be placed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Electronic surveillance

A

Tracking people’s activities with the aid of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Employee monitoring systems

A

Systems that monitor employees’ computers, email activities, and Internet surfing activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Encryption

A

The process of converting an original message into a form that cannot be read by anyone except the intended receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

End-user development

A

A software development approach in which the organization’s end users develop their own applications with little or no formal assistance from the IT department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Enterprise resource planning systems

A

Information systems that correct a lack of communication among the functional area ISs by tightly integrating the functional area ISs via a common database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Entity

A

Any person, place, thing, or event of interest to a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Entity-relationship (ER) diagram

A

A document that shows data entities and attributes and relationships among them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Entity-relationship (ER) modelling

A

The process of designing a database by organizing data entities to be used and identifying the relationships among them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Entry barrier

A

Product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Ergonomics

A

The science of adapting machines and work environments to people; it focuses on creating an environment that is safe, well lit, and comfortable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Ethics

A

The principles of right and wrong that individuals use to make choices to guide their behaviours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Exchanges

A

(or Public exchanges) Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Expert system

A

A system that attempts to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Explicit knowledge

A

The more objective, rational, and technical types of knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Exposure

A

The harm, loss, or damage that can result if a threat compromises an information resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Extensible markup language (XML)

A

A computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Fat clients

A

Computers that offer full functionality without having to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Feasibility study

A

An investigation that gauges the probability of success of a proposed project and provides a rough assessment of the project’s feasibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Field

A

A characteristic of interest that describes an entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Firewall

A

A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Flash memory devices

A

Nonvolatile electronic storage devices that are compact, are portable, require little power, and contain no moving parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Foreign key

A

A field (or group of fields) in one table that uniquely identifies a row (or record) of another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Forward auction

A

Auction that sellers use as a selling channel to many potential buyers; the highest bidder wins the items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Functional area information system

A

A system that supports a particular functional area within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Functional dependency

A

A means of expressing that the value of one particular attribute is associated with, or determines, a specific single value of another attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

General controls

A

Controls that apply to more than one functional area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Gesture recognition

A

An input method that interprets human gestures, in an attempt for computers to begin to understand human body language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Globalization

A

The integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology.

136
Q

Graphical user interface

A

Systems software that allows users to have direct control of the hardware by manipulating visible objects (such as icons) and actions, which replace command syntax.

137
Q

Grid computing

A

A technology that applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.

138
Q

Group purchasing

A

The aggregation of purchasing orders from many buyers so that a volume discount can be obtained.

139
Q

Hardware

A

A device such as a processor, monitor, keyboard, or printer. Together, these devices accept, process, and display data and information.

140
Q

HTML5

A

A page-description language that makes it possible to embed images, audio, and video directly into a document without add-ons. Also makes it easier for web pages to function across different display devices, including mobile devices and desktops, and supports the storage of data offline.

141
Q

Hybrid clouds

A

Clouds composed of public and private clouds that remain unique entities but are bound together, offering the benefits of multiple deployment models.

142
Q

Hypertext markup language (HTML)

A

A page-description language for specifying how text, graphics, video, and sound are placed on a web page document.

143
Q

Identity theft

A

Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.

144
Q

Implementation

A

The process of converting from an old computer system to a new one.

145
Q

Individual social responsibility

A

Efforts by organizations or individuals to solve various social problems.

146
Q

Information

A

Data that have been organized so that they have meaning and value to the recipient.

147
Q

Information privacy

A

The right to determine when, and to what extent, personal information can be gathered by and/or communicated to others.

148
Q

Information security

A

Protecting an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

149
Q

Information system

A

A system that collects, processes, stores, analyzes, and disseminates information for a specific purpose.

150
Q

Information systems audit

A

An examination of information systems, their inputs, outputs, and processing.

151
Q

Information technology

A

Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization.

152
Q

Information technology components

A

Hardware, software, databases, and networks.

153
Q

Information technology infrastructure

A

IT components plus IT services.

154
Q

Information technology platform

A

Formed by the IT components of hardware, software, networks (wireline and wireless), and databases.

155
Q

Information technology services

A

Services performed by IT personnel using IT components, including developing information systems, overseeing security and risk, and managing data.

156
Q

Informed user

A

A person knowledgeable about information systems and information technology.

157
Q

Infrastructure-as-a-service (IaaS) model

A

A model with which cloud computing providers offer remotely accessible servers, networks, and storage capacity.

158
Q

Instance

A

Each row in a relational table, which is a specific, unique representation of the entity.

159
Q

Integrated CASE (ICASE) tools

A

CASE tools that provide links between upper CASE and lower CASE tools.

160
Q

Intellectual capital

A

(or intellectual assets) Other terms for “knowledge.”

161
Q

Intellectual property

A

The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.

162
Q

Interorganizational information systems

A

Information systems that connect two or more organizations.

163
Q

IS operational plan

A

A clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.

164
Q

IT governance

A

A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes.

165
Q

IT steering committee

A

A committee, composed of a group of managers and staff representing various organizational units, set up to establish IT priorities and to ensure that the MIS function is meeting the needs of the enterprise.

166
Q

IT strategic plan

A

A set of long-range goals that describe the IT infrastructure and major IT initiatives needed to achieve the goals of the organization.

167
Q

Join operation

A

A database operation that combines records from two or more tables in a database.

168
Q

Joint application design

A

A group-based tool for collecting user requirements and creating system designs.

169
Q

Knowledge

A

Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity.

170
Q

Knowledge management (KM)

A

A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization’s memory and that typically reside within the organization in an unstructured manner.

171
Q

Knowledge management systems (KMSs)

A

Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.

172
Q

Knowledge workers

A

Professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are experts in a particular subject area and create information and knowledge, which they integrate into the business.

173
Q

Least privilege

A

A principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.

174
Q

Liability

A

A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

175
Q

Logic bombs

A

Segments of computer code embedded within an organization’s existing computer programs.

176
Q

Logical controls

A

Controls that are implemented by software.

177
Q

Lower CASE tools

A

Tools used to automate later stages in the systems development life cycle (programming, testing, operation, and maintenance).

178
Q

Magnetic disks

A

(or hard drives or fixed disk drives) A form of secondary storage on a magnetized disk divided into tracks and sectors that provide addresses for various pieces of data.

179
Q

Magnetic tape

A

A secondary storage medium on a large open reel or in a smaller cartridge or cassette.

180
Q

Make-to-order

A

The strategy of producing customized products and services.

181
Q

Malware

A

Malicious software such as viruses and worms.

182
Q

Mashup

A

Website that takes different content from a number of other websites and mixes them together to create a new kind of content.

183
Q

Mass customization

A

A production process in which items are produced in large quantities but are customized to fit the desires of each customer.

184
Q

Master data

A

A set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span an enterprise’s information systems.

185
Q

Master data management

A

A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely “single version of the truth” for a company’s core master data.

186
Q

Microblogging

A

A form of blogging that allows users to write short messages (or capture an image or embedded video) and publish them.

187
Q

Microprocessor

A

The CPU, made up of millions of transistors embedded in a circuit on a silicon wafer or chip.

188
Q

Mobile commerce

A

(or m-commerce) Electronic commerce conducted in a wireless environment.

189
Q

Moore’s law

A

Prediction by Gordon Moore, an Intel cofounder, that microprocessor complexity would double approximately every two years.

190
Q

Multichannelling

A

A process in which a company makes its products available for sale using both online and off-line channels (for example, through retail stores).

191
Q

Multidimensional structure

A

Storage of data in more than two dimensions; a common representation is the Data cube.

192
Q

Multimedia technology

A

Computer-based integration of text, sound, still images, animation, and digitized full-motion video.

193
Q

Network

A

A connecting system (wireline or wireless) that permits different computers to share resources.

194
Q

Network controls

A

(or Communications controls) Controls that deal with the movement of data across networks.

195
Q

Normalization

A

A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

196
Q

Object-oriented development

A

A systems development methodology that begins with aspects of the real world that must be modelled to perform a task.

197
Q

Office automation system

A

Software that supports the daily work activities of individuals and groups, such as software for creating documents and preparing emails.

198
Q

On-premise computing

A

A model of IT management where companies own their IT infrastructure (software, hardware, networks, and data management) and maintain it in their data centres.

199
Q

Open system

A

Computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization.

200
Q

Open-source software

A

Software made available in source-code form at no cost to developers.

201
Q

Operating system

A

The main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware.

202
Q

Opt-in model

A

A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it.

203
Q

Opt-out model

A

A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.

204
Q

Optical storage devices

A

A form of secondary storage in which a laser reads the surface of a reflective plastic platter.

205
Q

Organizational social responsibility

A

(or individual social responsibility) Efforts by organizations or individuals to solve various social problems.

206
Q

Outsourcing

A

The use of outside contractors or external organizations to acquire IT services.

207
Q

Package

A

(or software suite) An integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.

208
Q

Password

A

A private combination of characters that only the user should know.

209
Q

Patent

A

A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.

210
Q

Permission marketing

A

Method of marketing that asks consumers to give their permission to voluntarily accept online advertising and email.

211
Q

Personal application software

A

General-purpose, off-the-shelf application programs that support general types of processing, rather than being linked to any specific business function.

212
Q

Phased conversion

A

A systems implementation process that introduces components of the new system in stages, until the entire new system is operational.

213
Q

Phishing attack

A

An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking email.

214
Q

Physical controls

A

Controls that restrict unauthorized individuals from gaining access to a company’s computer facilities.

215
Q

Pilot conversion

A

A systems implementation process that introduces the new system in one part of the organization on a trial basis; when the new system is working properly, it is introduced in other parts of the organization.

216
Q

Piracy

A

Copying a software program (other than freeware, demo software, etc.) without making payment to the owner.

217
Q

Platform-as-a-service (PaaS) model

A

A model with which customers rent servers, operating systems, storage, a database, software development technologies such as Java and .NET, and network capacity over the Internet.

218
Q

Pop-under ad

A

An advertisement that is automatically launched by some trigger and appears underneath the active window.

219
Q

Pop-up ad

A

An advertisement that is automatically launched by some trigger and appears in front of the active window.

220
Q

Primary activities

A

Those business activities related to the production and distribution of the firm’s products and services, thus creating value.

221
Q

Primary key

A

A field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted.

222
Q

Primary storage

A

(or main memory) High-speed storage located directly on the motherboard that stores data to be processed by the CPU, instructions telling the CPU how to process the data, and operating system programs.

223
Q

Privacy

A

The right to be left alone and to be free of unreasonable personal intrusions.

224
Q

Privacy codes

A

(or privacy policies) An organization’s guidelines for protecting the privacy of customers, clients, and employees.

225
Q

Privacy policies

A

(or privacy codes) An organization’s guidelines for protecting the privacy of customers, clients, and employees.

226
Q

Private clouds

A

(or Internal clouds or Corporate clouds) IT infrastructures that are accessible only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all the business units within a single organization.

227
Q

Privilege

A

A collection of related computer system operations that can be performed by users of the system.

228
Q

Procedures

A

The set of instructions for combining hardware, software, database, and network components in order to process information and generate the desired output.

229
Q

Profiling

A

The process of forming a digital dossier.

230
Q

Programmers

A

IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements.

231
Q

Programming

A

The translation of a system’s design specifications into computer code.

232
Q

Proprietary software

A

Software that has been developed by a company and has restrictions on its use, copying, and modification.

233
Q

Prototype

A

A small-scale working model of an entire system or a model that contains only the components of the new system that are of most interest to the users.

234
Q

Prototyping

A

An approach to systems development that defines an initial list of user requirements, builds a prototype system, and then improves the system in several iterations based on users’ feedback.

235
Q

Public clouds

A

Shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).

236
Q

Public exchanges

A

(or exchanges) Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.

237
Q

Public-key encryption

A

(or asymmetric encryption) A type of encryption that uses two different keys: a public key and a private key.

238
Q

Query by example (QBE)

A

Obtaining information from a relational database by filling out a grid or template—also known as a Form—to construct a sample or a description of the data desired.

239
Q

Random access memory

A

The part of primary storage that holds a software program and small amounts of data when they are brought from secondary storage.

240
Q

Rapid application development

A

A systems development method that uses special tools and an iterative approach to rapidly produce a high-quality system.

241
Q

Read-only memory

A

Type of primary storage where certain critical instructions are safeguarded; the storage is nonvolatile and retains the instructions when the power to the computer is turned off.

242
Q

Really Simple Syndication

A

A technology that allows users to receive the information they want, when they want it, without having to surf thousands of websites.

243
Q

Record

A

A grouping of logically related fields.

244
Q

Registers

A

High-speed storage areas in the CPU that store very small amounts of data and instructions for short periods.

245
Q

Relational database model

A

A data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.

246
Q

Relationships

A

Operators that illustrate an association between two entities.

247
Q

Responsibility

A

A tenet of ethics in which you accept the consequences of your decisions and actions.

248
Q

Reverse auction

A

Auction in which one buyer, usually an organization, seeks to buy a product or a service, and suppliers submit bids; the lowest bidder wins.

249
Q

Risk

A

The likelihood that a threat will occur.

250
Q

Risk acceptance

A

A strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.

251
Q

Risk analysis

A

The process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.

252
Q

Risk limitation

A

A strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.

253
Q

Risk management

A

A process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels.

254
Q

Risk mitigation

A

A process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

255
Q

Risk transference

A

A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.

256
Q

Scope creep

A

The addition of functions to an information system after the project has begun.

257
Q

Secondary key

A

A field that has some identifying information, but typically does not uniquely identify a record with complete accuracy.

258
Q

Secondary storage

A

Technology that can store very large amounts of data for extended periods.

259
Q

Secure socket layer

A

(or Transport layer security) An encryption standard used for secure transactions such as credit card purchases and online banking.

260
Q

Sell-side marketplace

A

Business-to-business model in which organizations sell to other organizations from their own private e-marketplace and/or from a third-party site.

261
Q

Server farms

A

Collections of hundreds or thousands of networked server computers maintained in a single location and used for applications that require very large amounts of computing power.

262
Q

Server virtualization

A

A technology that uses software-based partitions to create multiple virtual servers (called Virtual machines) on a single physical server.

263
Q

Servers

A

Computers that support networks, enabling users to share files, software, and other network devices.

264
Q

Service-oriented architecture

A

An IT architecture that makes it possible to construct business applications using web services.

265
Q

Smart cards

A

Cards that contain a microprocessor (chip) that enables the card to store a considerable amount of information (including stored funds) and to conduct processing.

266
Q

Social advertising

A

Advertising formats that make use of the social context of the user viewing the ad.

267
Q

Social capital

A

The number of connections a person has within and between social networks.

268
Q

Social commerce

A

The delivery of electronic commerce activities and transactions through social computing.

269
Q

Social computing

A

A type of information technology that combines social behaviour and information systems to create value.

270
Q

Social engineering

A

Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.

271
Q

Social graph

A

A map of all relevant links or connections for one member of a social network.

272
Q

Social intelligence

A

The monitoring, collection, and analysis of socially generated data and the resultant strategic decisions.

273
Q

Social interface

A

A user interface that guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands.

274
Q

Social marketplaces

A

Online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.

275
Q

Social network

A

A social structure composed of individuals, groups, or organizations linked by values, visions, ideas, financial exchange, friendship, kinship, conflict, or trade.

276
Q

Social networking

A

Activities performed using social software tools (e.g., blogging) or social networking features (e.g., media sharing).

277
Q

Social shopping

A

A method of electronic commerce that takes all of the key aspects of social networks—friends, groups, voting, comments, discussions, reviews, etc.—and focuses them on shopping.

278
Q

Software

A

A set of computer programs that enable the hardware to process data.

279
Q

Software suite

A

An integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.

280
Q

Software-as-a-service

A

A method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the Internet.

281
Q

Software-as-a-service (SaaS) delivery model

A

A delivery model with which cloud computing vendors provide software that is specific to their customers’ requirements.

282
Q

Solid-state drives

A

Data storage devices that serve the same purpose as a hard drive and store data in memory chips.

283
Q

Spam

A

Unsolicited email.

284
Q

Spamming

A

Indiscriminate distribution of email without the receiver’s permission.

285
Q

Spamware

A

Alien software that uses your computer as a launch platform for spammers.

286
Q

Spear phishing

A

An attack that uses deception to target large groups of people, by masquerading as official-looking emails or instant messages.

287
Q

Speech-recognition software

A

Software that recognizes and interprets human speech, either one word at a time (discrete speech) or in a stream (continuous speech).

288
Q

Spyware

A

Alien software that can record your keystrokes and/or capture your passwords.

289
Q

Stored-value money cards

A

A form of electronic cash on which a fixed amount of prepaid money is stored; the amount is reduced each time the card is used.

290
Q

Strategic information systems

A

Systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity.

291
Q

Structured query language (SQL)

A

The most popular query language for requesting information from a relational database.

292
Q

Supply chain

A

The flow of materials, information, money, and services from suppliers of raw materials through factories and warehouses to the end customers.

293
Q

Support activities

A

Business activities that do not add value directly to a firm’s product or service under consideration but support the primary activities that do add value.

294
Q

Systems analysis

A

The examination of the business problem that the organization plans to solve with an information system.

295
Q

Systems analysts

A

IS professionals who specialize in analyzing and designing information systems.

296
Q

Systems design

A

The way in which a new system will resolve a business problem.

297
Q

Systems development life cycle

A

The traditional structured framework, used for large IT projects, that consists of sequential processes by which information systems are developed.

298
Q

Systems investigation

A

The initial stage in the traditional systems development life cycle that addresses the business problem (or business opportunity) by means of the feasibility study.

299
Q

Systems software

A

The class of computer instructions that serve primarily as an intermediary between computer hardware and application programs; provides important self-regulatory functions for computer systems.

300
Q

Systems stakeholders

A

All people who are affected by changes in information systems.

301
Q

Table

A

(or Data file) A collection of logically related records.

302
Q

Tacit knowledge

A

The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.

303
Q

Tag

A

A keyword or term that describes a piece of information.

304
Q

Technical specialists

A

Experts in a certain type of technology, such as databases or telecommunications.

305
Q

Ternary relationship

A

A relationship that exists when three entities are associated.

306
Q

Thin client

A

A computer that does not offer the full functionality of a fat client.

307
Q

Threat

A

Any danger to which an information resource may be exposed.

308
Q

Thumb drive

A

Storage device that fits into the universal serial bus port of a personal computer and is used for portable storage.

309
Q

Trade secret

A

Intellectual work, such as a business plan, that is a company secret and is not based on public information.

310
Q

Transaction processing system

A

A system that supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data.

311
Q

Transport layer security

A

(or secure socket layer) An encryption standard used for secure transactions such as credit card purchases and online banking.

312
Q

Trap door

A

(or Back door) Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.

313
Q

Trojan horse

A

A software program containing a hidden function that presents a security risk.

314
Q

Tunnelling

A

A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.

315
Q

Tweets

A

Messages and updates posted by users on Twitter.

316
Q

Twitter

A

A free microblogging service that allows its users to send messages and read other users’ messages and updates.

317
Q

Unary relationship

A

A relationship that exists when an association is maintained within a single entity.

318
Q

Upper CASE tools

A

Tools that are used to automate the early stages of the systems development life cycle (systems investigation, analysis, and design).

319
Q

Utility computing

A

A technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed.

320
Q

Value chain

A

A sequence of activities through which the organization’s inputs, whatever they are, are transformed into more valuable outputs, whatever they are.

321
Q

Value chain model

A

A business framework devised by Michael Porter that shows the primary activities that sequentially add value to the profit margin; also shows the support activities.

322
Q

Value system

A

A business system that includes the producers, suppliers, distributors, and buyers, all with their value chains.

323
Q

Viral marketing

A

Online word-of-mouth marketing.

324
Q

Virtual organizations

A

(or pure play organizations) Organizations in which the product, the process, and the delivery agent are all digital.

325
Q

Virtual private network

A

A private network that uses a public network (usually the Internet) to securely connect users by using encryption.

326
Q

Virus

A

Malicious software that can attach itself with (or “infect”) other computer programs without the owner of the program being aware of the infection.

327
Q

Vulnerability

A

The possibility that an information resource will be harmed by a threat.

328
Q

Web 2.0

A

A loose collection of information technologies and applications, plus the websites that use them.

329
Q

Web 2.0 media

A

Any website that provides user-generated media content and promotes tagging, rating, commenting, and other interactions among users and their media contributions.

330
Q

Web services

A

Applications delivered over the Internet that IT developers can select and combine through almost any device, from personal computers to mobile phones.

331
Q

Weblog

A

(or Blog) A personal website, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries.

332
Q

Whitelisting

A

A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.

333
Q

Wiki

A

A website on which anyone can post material and make changes to other material.

334
Q

Worms

A

Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.

335
Q

Zombie

A

(or Bot) A computer that has been compromised by, and is under the control of, a hacker.