Glossary Flashcards

1
Q

10/100/1000 Ethernet

A

A type of Ethernet that conforms to the IEEE 802.3 protocol and allows for transmission at a rate of 10, 100, or 1,000 Mbps (megabits per second).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstract reasoning

A

The ability to make and manipulate models. One of the four key skills for nonroutine cognitive thinking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access

A

A popular personal and small workgroup DBMS product licensed by Microsoft. Included with some versions of Microsoft Office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACID

A

An acronym standing for atomic, consistent, isolated, and durable. Used to describe the processing of transactions such that all of the transaction is processed or none of it is (atomic), transactions are processed in the same manner (consistent) whether processed alone or in the presence of millions of other transactions (isolated), and that once a transaction is stored it never goes away—even in the presence of failure (durable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activity

A

A business function that receives inputs and produces outputs. An activity can be performed by a human, by a computer system, or by both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ad-blocking software

A

Software that filters out advertising content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Persistent Threat (APT)

A

A sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments. APTs are a means to engage in cyberwarfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A

Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and, unknown to the user, observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agile development

A

An adaptive project management process based on the principles:
- Expect, even welcome, changes in requirements.
- Frequently deliver working version of the product.
- Work closely with customer for the duration.
- Design as you go.
- Test as you go.
- Team knows best how it’s doing/how to change.
- Can be used for business processes, information systems, and applications development.
Can be used for the management of many types of projects, including processes, information systems, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An adaptive project management process based on the principles listed in Figure 12-20 . Can be used for the management of many types of projects, including processes, information systems, and applications

A

A mobile operating system that is a version of Linux. Android runs on the Google Nexus 7 and the Amazon Kindle Fire as well as many other mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application

A

(1) Synonym for application software. (2) A combination of hardware, software, and data that is to be developed for an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application software

A

Programs that perform a business function. Some application programs are general purpose, such as Excel or Word. Other application programs are specific to a business function, such as accounts payable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Artificial intelligence (AI)

A

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As-is model

A

A model that represents the current situation and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric encryption

A

An encryption method whereby different keys are used to encode and to decode the message; one key encodes the message, and the other key decodes the message. Asymmetric encryption is slower and more complicated than symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asynchronous communication

A

Information exchange that occurs when all members of a work team do not meet at the same time, such as those who work different shifts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attributes

A

Characteristics of an entity. Example attributes of Order are OrderNumber, OrderDate, SubTotal, Tax, Total, and so forth. Example attributes of Salesperson are SalespersonName, Email, Phone, and so forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Augmented reality (AR)

A

The altering of reality by overlaying digital information on real world objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authentication

A

The process whereby an information system verifies (validates) a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Baseline WBS

A

The initial work breakdown structure that shows the planned tasks, dependencies, durations, and resource assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bell’s Law

A

A new computer class forms roughly each decade, establishing a new industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Best practices

A

Methods that have been shown to produce successful results in prior implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BI analysis

A

The process of creating business intelligence. The four fundamental categories of BI analysis are reporting, data mining, Big Data, and knowledge management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BI application

A

The software component of a BI system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Big Data

A

A term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Biometric authentication

A

The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BI server

A

A Web server application that is purpose-built for the publishing of business intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bits

A

The means by which computers represent data; also called binary digits. A bit is either a zero or a one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

BlackBerry OS

A

One of the most successful early mobile operating systems; was primarily used by business users on BlackBerry devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bluetooth

A

A common wireless protocol designed for transmitting data over short distances, replacing cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Bounce rate

A

Percent of people who visit your Web site and then immediately leave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Bring your own device (BYOD) policy

A

An official organizational policy that states employees’ permissions and responsibilities when using personal mobile devices for organizational business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Brooks’ Law

A

The adage that states: Adding more people to a late project makes the project later. Brooks’ Law is true not only because a larger staff requires increased coordination, but also because new people need to be trained. The only people who can train the new employees are the existing team members, who are thus taken off productive tasks. The costs of training new people can overwhelm the benefit of their contributions. Named for Fred Brooks, author of The Mythical Man-Month.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Brute force attack

A

A password-cracking program that tries every possible combination of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Bullwhip effect

A

A phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Business analyst

A

(1) A person who understands business strategies, goals, and objectives and who helps businesses develop and manage business processes and information systems. (2) Someone who is well versed in Porter’s models, organizational strategy, and systems alignment theory, like COBIT, and who also understands technology sufficiently well to communicate with systems analysts and developers. Compare with systems analyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Business intelligence (BI)

A

The processing of operational data, social data, purchased data, and employee knowledge to expose solutions, patterns, relationships, and trends of importance to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Business intelligence (BI) systems

A

Information systems that produce business intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Business process

A

(1) A network of activities that generate value by transforming inputs into outputs. (2) A network of activities, repositories, roles, resources, and flows that interact to achieve some business function; sometimes called a business system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Business process management (BPM)

A

A cyclical process for systematically creating, assessing, and altering business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Business Process Modeling Notation (BPMN)

A

Standard set of terms and graphical notations for documenting business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Business process reengineering

A

The activity of altering existing and designing new business processes to take advantage of the capabilities of new information systems technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Business-to-business (B2B)

A

Relationships through which businesses generate new retail leads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Business-to-consumer (B2C)

A

Relationships through which businesses market their products to end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Bytes

A

(1) 8-bit chunks of data. (2) Characters of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Cable line

A

Cable television lines that provide high-speed data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Capital

A

Resources that are invested with the expectation of future gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Carrier

A

A telecommunications company that provides voice and data transportation services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Central processing unit (CPU)

A

The portion of a computer that selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Chief information officer (CIO)

A

The title of the principal manager of the IS department. Other common titles are vice president of information services, director of information services, and, less commonly, director of computer services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Chief information security officer (CISO)

A

The title of the person who manages security for the organization’s information systems and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Chief security officer (CSO)

A

The title of the person who manages security for all of the organization’s assets: physical plant and equipment, employees, intellectual property, and digital.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Chief technology officer (CTO)

A

The title of the head of the technology group. The CTO filters new ideas and products to identify those that are most relevant to the organization. The CTO’s job requires deep knowledge of information technology and the ability to envision how new IT could affect an organization over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Client

A

PCs, tablets, and smartphones that access servers via the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Client-server architecture

A

Computing architecture that allows clients (users) to send requests across the Internet to servers, which respond and send data back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Closed source

A

Source code that is highly protected and only available to trusted employees and carefully vetted contractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Cloud

A

A term that refers to elastic leasing of pooled computer resources over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cloud computing architecture

A

Computing architecture that allows employees and customers to access organizational data and applications located in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cluster analysis

A

Unsupervised data mining using statistical techniques to identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers in data about customer orders and customer demographics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

COBIT (Control Objectives for Information and related Technology)

A

A set of standard practices, created by the Information Systems Audit and Control Association, that are used in the assessment stage of the BPM cycle to determine how well an information system complies with an organization’s strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Collaboration

A

The activity of two or more people working together to achieve a common goal via a process of feedback and iteration. One of four key skills for nonroutine cognitive thinking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Collaboration information system

A

An information system that supports collaboration. See also collaboration system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Columns

A

Also called fields, or groups of bytes. A database table has multiple columns that are used to represent the attributes of an entity. Examples are PartNumber, EmployeeName, and SalesDate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Commerce server

A

An application program that runs on a server tier computer. A typical commerce server obtains product data from a database, manages items in users’ shopping carts, and coordinates the checkout process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Communication channels

A

Means of delivering messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Communities of practice

A

Also called communities; groups of people related by a common interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Competitive analysis

A

Process of identifying the strength and weaknesses in competitors’ use of social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Competitive strategy

A

The strategy an organization chooses as the way it will succeed in its industry. According to Porter, there are four fundamental competitive strategies: cost leadership across an industry or within a particular industry segment and product or service differentiation across an industry or within a particular industry segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Computer-based information system

A

An information system that includes a computer.

70
Q

Computer hardware

A

Electronic components and related gadgetry that input, process, output, store, and communicate data according to the instructions encoded in computer programs or software. One of the five fundamental components of an information system. 

71
Q

Computer terminal

A

A computing device consisting of a screen, keyboard, and network connection. Also called a thin client

72
Q

Confidence

A

In market-basket terminology, the probability estimate that two items will be purchased together.

73
Q

Configuration control

A

A set of management policies, practices, and tools that systems developers use to maintain control over a project’s resources.

74
Q

Connection data

A

In social media systems, data about relationships

75
Q

Constructive criticism

A

Both positive and negative advice given to improve an outcome.

76
Q

Content data

A

In social media systems, data and responses to data that are contributed by users and SM sponsors.

77
Q

Content delivery network (CDN)

A

An information system that serves content to Web pages over the Internet. To reduce wait time, data is typically stored and served from many geographic locations.

78
Q

Content management systems (CMS)

A

Information systems that support the management and delivery of documentation including reports, Web pages, and other expressions of employee knowledge.

79
Q

Control flow

A

A BPMN symbol that documents the flow of activity in a business process.

80
Q

Conversion rate

A

Measures the frequency with which someone who clicks on an ad makes a purchase, “likes” a site, or takes some other action desired by the advertiser.

81
Q

Cookie

A

A small file that is stored on the user’s computer by a browser. Cookies can be used for authentication, for storing shopping cart contents and user preferences, and for other legitimate purposes. Cookies can also be used to implement spyware

82
Q

Cooperation

A

The process by which a group of people having the same skills work in parallel to shorten the time required to accomplish a job (e.g., four painters each painting one wall of a room).

83
Q

Cost

A

The cost of a business process is equal to the cost of the inputs plus the cost of activities.

84
Q

Cost feasibility

A

An assessment of the cost of an information system development project that compares estimated costs to the available budget. Can also refer to a comparison of development plus operational costs versus value delivered.

85
Q

Critical path

A

The sequence of activities that determine the earliest date by which the project can be completed.

86
Q

Critical path analysis

A

The process by which project managers compress a schedule by moving resources, typically people, from noncritical path tasks to critical path tasks.

87
Q

Cross-selling

A

The sale of related products to customers based on salesperson knowledge, market-basket analysis, or both.

88
Q

Crowdsourcing

A

The dynamic social media process of employing users to participate in product design or redesign.

89
Q

Crow’s feet

A

Lines on an entity-relationship diagram that indicate a 1:N relationship between two entities.

90
Q

Crow’s-foot diagram

A

A type of entity-relationship diagram that uses a crow’s foot symbol to designate a 1:N relationship.

91
Q

Custom-developed software

A

Software tailor-made for a particular organization’s requirements.

92
Q

Customer life cycle

A

Taken as a whole, the processes of marketing, customer acquisition, relationship management, and loss/churn that must be managed by CRM systems.

93
Q

Customer relationship management (CRM) system

A

A suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

94
Q

Data

A

Recorded facts or figures. One of the five fundamental components of n information system.

95
Q

Data acquisition

A

In business intelligence systems, the process of obtaining, cleaning, organizing, relating, and cataloging source data.

96
Q

Data administration

A

An organization-wide function that develops and enforces data policies and standards.

97
Q

Data flow

A

A BPMN symbol that documents the movement of data among activities and repositories in a business process.

98
Q

Data integrity

A

In a database or a collection of databases, the condition that exists when data values are consistent and in agreement with one another.

99
Q

Data integrity problem

A

In a database, the situation that exists when data item values disagree with one another. An example is two different names for the same customer.

100
Q

Data mart

A

A data collection, smaller than a data warehouse, that addresses the needs of a particular department or functional area of a business.

101
Q

Data mining

A

The application of statistical techniques to find patterns and relationships among data for classification and prediction.

102
Q

Data model

A

A logical representation of the data in a database that describes the data and relationships that will be stored in the database. Akin to a blueprint.

103
Q

Data safeguards

A

Measures used to protect databases and other data assets from threats. Includes data rights and responsibilities, encryptions, backup and recovery, and physical security.

104
Q

Data warehouse

A

A facility for managing an organization’s BI data.

105
Q

Database

A

A self-describing collection of integrated records.

106
Q

Database administration

A

A person or department that develops procedures and practices to ensure efficient and orderly multiuser processing of the database, to control changes to database structure, and to protect the database

107
Q

Database application

A

A collection of forms, reports, queries, and application programs that facilitates users’ processing of a database. A database can be processed by many different database applications.

108
Q

Database management system (DBMS)

A

A program for creating, processing, and administering a database. A DBMS is a large and complex program that is licensed like an operating system. Microsoft Access and Oracle Database are example DBMS products.

109
Q

Database tier

A

In the three-tier architecture, the tier that runs the DBMS and receives and processes requests to retrieve and store data.

110
Q

DB2

A

A popular, enterprise-class DBMS product licensed by IBM.

111
Q

Decision support systems

A

Some authors define business intelligence (BI) systems as supporting decision making only, in which case they use this older term as a synonym for decision-making BI systems.

112
Q

Decision tree

A

A hierarchical arrangement of criteria that predict a classification or a value.

113
Q

Deliverables

A

Work products that are the result of the completion of tasks in a development project.

114
Q

Denial of service (DoS)

A

Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity.

115
Q

Desktop virtualization

A

Also called client virtualization and PC virtualization. The process of storing a user’s desktop on a remote server. It enables users to run their desktop from many different client computers.

116
Q

Digital Revolution

A

The conversion from mechanical and analog devices to digital devices.

117
Q

Digital subscriber line (DSL)

A

A communications line that operates on the same lines as voice telephones but does so in such a manner that its signals to not interfere with voice telephone service.

118
Q

Dimension

A

A characteristic of an OLAP measure. Purchase date, customer type, customer location, and sales region are examples of dimensions.

119
Q

Discussion forums

A

Forms of asynchronous communication in which one group member posts an entry and other group members respond. A better form of group communication than email because it is more difficult for one person to monopolize the discussion or for the discussion to go off track.

120
Q

Diseconomies of scale

A

A principle that states as development teams become larger, the average contribution per worker decreases.

121
Q

Distributed database processing

A

The processing of a single database that resides in multiple locations.

122
Q

Distributed systems

A

Systems in which application processing is distributed across multiple computing devices.

123
Q

Domain name

A

A worldwide unique name registered in the domain name system (DNS) and affiliated with a public IP address.

124
Q

Domain Name System (DNS)

A

A directory naming system that assigns domain names to IP addresses.

125
Q

Drill down

A

With an OLAP report, to further divide the data into more detail.

126
Q

Dual processor

A

A computer with two CPUs.

127
Q

Dynamic processes

A

Flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.

128
Q

Dynamic reports

A

Business intelligence documents that are updated at the time they are requested.

129
Q

Elastic

A

In cloud computing, the situation that exists when the amount of resource leased can be dynamically increased or decreased, programmatically, in a short span of time, and organizations pay for just the resources that they use. This term was first used in this way by Amazon.com.

130
Q

Email

A

A form of asynchronous communication in which participants send comments and attachments electronically. As a form of group communication, it can be disorganized, disconnected, and easy to hide from.

131
Q

Email spoofing

A

A synonym for phishing. A technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends email requests for confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. Phishers direct traffic to their sites under the guise of a legitimate business

132
Q

Encapsulated

A

A characteristic of systems design in which the details of a process are hidden from users of that process. A formal interface is defined for the process that specifies how the process is to be accessed, what data it requires, and the data that it will produce. The means by which that process creates those results are never exposed, nor do they need to be.

133
Q

Encryption

A

The process of transforming clear text into coded, unintelligible text for secure storage or communication.

134
Q

Encryption algorithms

A

Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication.

135
Q

Enterprise 2.0

A

The use of emergent social software platforms within companies or between companies and their partners or customers.

136
Q

Enterprise application integration (EAI)

A

A suite of software applications that integrates existing systems by providing layers of software that connect applications together.

137
Q

Enterprise information system

A

Information systems that support cross-functional processes and activities in multiple departments.

138
Q

Enterprise processes

A

Processes that span an organization and support activities in multiple departments.

139
Q

Enterprise resource planning (ERP)

A

A suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

140
Q

Enterprise social network (ESN)

A

A software platform that uses social media to facilitate cooperative work of people within an organization.

141
Q

Entity

A

In the E-R data model, a representation of some thing that users want to track. Some entities represent a physical object; others represent a logical construct or transaction.

142
Q

Entity-relationship (E-R) data model

A

A tool for constructing data models that defines the entities stored in a database and the relationships among those entities.

143
Q

Entity-relationship (E-R) diagrams

A

A type of diagram used by database designers to document entities and their relationships to each other.

144
Q

ERP system

A

An information system based upon ERP technology.

145
Q

Ethernet

A

Another name for the IEEE 802.3 protocol, Ethernet is a communications standard that specifies how messages are to be packaged, processed, and transmitted for wired transmission over a LAN.

146
Q

Exabyte (EB)

A

1,024 PB

147
Q

Experimentation

A

A careful and reasoned analysis of an opportunity, envisioning potential products or solutions or applications of technology and then developing those ideas that seem to have the most promise, consistent with the resources you have. One of four key skills for nonroutine cognitive thinking.

148
Q

Expert systems

A

Rule-based systems that encode human knowledge in the form of If/Then rules.

149
Q

Expert systems shells

A

A program in an expert system that processes a set of rules, typically many times, until the values of the variables no longer change, at which point the system reports the results.

150
Q

Fields

A

Also called columns; groups of bytes in a database table. A database table has multiple columns that represent the attributes of an entity. Examples are PartNumber, EmployeeName, and SaleDate.

151
Q

File

A

A group of similar rows or records. In a database, sometimes called a table.

152
Q

File server

A

A networked computer that stores files.

153
Q

File Transfer Protocol (ftp)

A

An applications-layer protocol used to transfer files over the Internet.

154
Q

Firewall

A

Computing devices located between public and private networks that prevent unauthorized access to or from the internal network. A firewall can be a special-purpose computer, or it can be a program on a general-purpose computer or on a router.

155
Q

Firmware

A

Computer software installed into devices such as printers, print servers, and various types of communication devices. The software is coded just like other software, but it is installed into special, programmable memory of the printer or other device.

156
Q

Five-component framework

A

The five fundamental components of an information system—computer hardware, software, data, procedures, and people—present in every information system, from the simplest to the most complex.

157
Q

Five forces model

A

Model, proposed by Michael Porter, that assesses industry characteristics and profitability by means of five competitive forces—bargaining power of suppliers, threat of substitution, bargaining power of customers, rivalry among firms, and threat of new entrants.

158
Q

Folksonomy

A

A structure of content that emerges from the activity and processing of many users

159
Q

Foreign keys

A

A column or group of columns used to represent relationships. Values of the foreign key match values of the primary key in a different (foreign) table.

160
Q

Freemium

A

A revenue model offering a basic service for free and charging a premium for upgrades or advanced features.

161
Q

Functional application

A

Software that provides features and functions necessary to support a particular business activity or department (function).

162
Q

Functional information systems

A

Workgroup information systems that support a particular business function.

163
Q

Gantt chart

A

A timeline graphical chart that shows tasks, dates, dependencies, and possibly resources

164
Q

Gigabyte (GB)

A

1,024 MB

165
Q

GNU

A

A set of tools for creating and managing open source software. Originally created to develop an open source Unix-like operating system.

166
Q

GNU general public license (GPL) agreement

A

One of the standard license agreements for open source software.

167
Q

Google Drive

A

Cloud-based hardware used for sharing documents, spreadsheets, presentations, drawings, and other types of data. Includes version tracking. Used in conjunction with Google Docs.

168
Q

Gramm-Leach-Bliley (GLB) Act

A

Passed by Congress in 1999, this act protects consumer financial data stored by financial institutions, which are defined as banks, securities firms, insurance companies, and organizations that provide financial advice, prepare tax returns, and provide similar financial services.

169
Q

Granularity

A

The level of detail in data. Customer name and account balance is large granularity data. Customer name, balance, and details of all contacts with that customer, orders, and payments is smaller granularity.

170
Q

Graphical queries

A

Queries in which criteria are created when the user clicks on a graphic.