Information Systems for Business and Beyond Flashcards

1
Q

the head of the information systems function and aligns the plans and operations of the information systems with the strategic goals of the function.

A

CIO: Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Person in charge of setting information system policies for an organization, and then overseeing the implementation of those policies.

A

Information Security Officer:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the person who plans, develops, monitors and maintains databases that are used as part of applications or the data
warehouse.

A

Database Administrator:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of facts, that is intangible.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processed data that possess context, relevance, and purpose.

A

Information:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technology, people, and processes that allow us to take and transform meaningless data into useful information for decision making.

A

Information System (IS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A subset, or one component of information systems that allow us to take and transform meaningless data into
useful information for decision making.

A

Information Technology (IT):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

human beliefs or perceptions about relationships among facts or concepts relevant to that area.

A

Knowledge:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

when a person can combine their knowledge and experience to produce a deeper understanding of a topic.(

A

Wisdom:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when a company successfully attracts more customers, earns more profit, or returns more value to its shareholders than rival firms do.

A

Competitive Advantage:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

strategy where a firm offers customers its product or service at a lower price than its rivals can.

Example: Walmart

A

Cost Leadership:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

strategy where a company tries to add value to their products and services so they can attract customers who are willing to pay a higher price.

A

Differentiation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

obstacles that make it difficult to enter a given market.

A

Entry Barrier:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

strategy whereby a firm chooses to add value or lower costs for a smaller market.

A

Focus Strategy:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a plan to achieve advancements in technology or service by investing in research and development activities to meet previously unmet needs of buyers or meet their needs in a new way.

A

Innovation Strategy:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

refers to performing the same operational tasks better than rivals perform them.

A

Operational effectiveness:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A framework to determine the profitability and attractiveness of a market:

  • Industry Rivalry
  • Bargaining Power of Buyers
  • Bargaining Power of Suppliers
  • Threat of New Entrants
  • Threat of Substitute Products
A

Porter’s 5 Force Model:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

refers to performing different activities from those of rivals, or the same activities in a different way.

A

Strategic positioning:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A set of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.

A

Value Chain:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

continuous and can be represented by smooth wave pattern.

A

Analog signals:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

base-2 numeral system, which represents numeric values using two different symbols: 0 and 1.

A

Binary:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The smallest unit of data in a computer represented by one or zero.

A

Bit:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The electrical connection between different computer components that is an important determiner of the computer’s speed.

A

Bus:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A unit of data that computers use to represent a character such as a letter, number, or typographic symbol with a group of eight bits.

A

Byte:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The “brains” of the device, carries out the commands sent to it by the software and returns results to be acted
upon.

A

Central Processing Unit (CPU):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Where data is stored when the computer is turned off and where it is retrieved from when the computer is turned on.

A

Hard Disk:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A measure of computer processing speed.

A

Hertz:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

states that the number of transistors on a microchip double about every two years, resulting in the cost being halved.

A

Moore’s Law:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The working, volatile memory that begins to load information from the hard disk as the computer starts up.

A

Random Access Memory (RAM):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

non-volatile memory that permanently stores instructions for your computer.

A

Read Only Memory:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local
server or a personal computer. (4.3)

A

Cloud Computing:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Managing a company’s interactions with current and future customers. Often using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support.

A

Customer Relationship Management (CRM):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Stores and retrieves the data that an application creates and uses.

A

Database Management System (DBMS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A software application utilizing a central database that is implemented throughout the entire organization.

A

Enterprise Resources Planning (ERP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

a version of the Unix operating system that runs on a personal computer and is used primarily by scientists and engineers.

A

LINUX:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

software that is rented rather than purchased. It is subscription-based.

A

Software as a service (SaaS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

one instance of a set of fields in a table.

A

Record:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Consistency among the stored data.

A

Data Integrity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The structure and organization of data in a database

A

Data Hierarchy:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The use of a programming language to modify data in a database to make it easier to view or for the purpose of decision-making.

A

Database Manipulation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

the logical structure of the data items and their relationships.

A

Data Model:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

shows the relationships among the tables of data when a database is being designed.

A

Entity Relationship Diagram (ERD):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

contains only one file/table, with no relationships. A table created in a spreadsheet would be considered a flat file.

A

Flat File Database:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

to design a database in a way that reduces data redundancy; and ensures data integrity.

A

Normalization:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A graphical query tool, to retrieve data though visualized commands.

A

Query-by-Example (QBE):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

the rows of the table.

A

Record:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

data that is repeated in a database, which can cause the data set to be inconsistent.

A

Redundant Data:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Developed to provide an overall description of the database.

A

Schema:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The most common language for creating and manipulating databases. SQL inhabiting everything from
desktop software, to high-powered enterprise products.

A

Structured Query Language (SQL):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An early packet switching network that was originally developed by the US Department of Defense.

A

ARPANET (Advanced Research Projects Agency Network):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A network device that connects two networks together and only allows packets through that are needed.

A

Bridge:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

acts as a directory on the Internet when a request to access a device with a domain name is given.

A

Domain Name System (DNS):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A descriptive text followed by the top level domain that is human friendly name for a device on the internet.

A

Domain Name:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

the end of the domain name that indicates type of organization, such as .com, .org, .net, .edu…etc.

A

Domain Name Extension:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet
securely.

A

Extranet:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A local or restricted communications network

A

Intranet:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A unique identifying number assigned to every device that communicates on the internet.

A

IP Address:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

network that connects computers and other devices in a relatively small area, typically a single building or a
group of buildings.

A

LAN: Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Spans a larger area like a city or region

A

Metropolitan Area Network (MAN):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

large network that connects computers at different

sites via telecommunications media such as phone lines, satellites, and microwaves

A

wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Converts the format of the data so it may be transmitted between computers.

A

Modem:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

The fundamental unit of data transmitted over the internet. Each packet includes the sender’s address, the destination address, a sequence number and piece of the overall message to be sent.

A

Packet:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When a packet is passed from one router to another across the Internet until it reaches its destination.

A

Packet Switching:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A specific set of communication rules used by computers.

A

Protocol:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A device that receives and analyzes packets and then routes them towards their destination.

A

Router:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Manages network resources or performs special tasks such as storing files, managing one or more printers, or processing database queries.

A

Server:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Defines how electronic devices should be connected over the Internet, and how data should be transmitted between them.

A

TCP/IP: Transmission Control Protocol / Internet Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A method employing encryption to provide secure access to a remote computer over the Internet.

A

VPN: Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Refers to systems in which non-programmers can create working applications.

A

End-User Computing:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The old and new system are used simultaneously for a limited period of time.

A

Implementation Methodology – Parallel Operation:

72
Q

The organization selects a particular date that the old system is not going to be used. On that date, the old system is turned off and the new one is operational.

A

Implementation Methodology – Direct Cutover :

73
Q

Different functions of the new application are implemented in phases, adding functionality as the phases are implemented.

A

Implementation Methodology – Phased Implementation:

74
Q

A subset of the organization starts using the new system before the rest of the organization.

A

Implementation Methodology – Pilot Implementation:

75
Q

A methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops

A

Joint Application Development :

76
Q

A methodology that focuses on taking an initial idea and developing a minimum viable product

A

Lean Methodology:

77
Q

A working software application with just enough functionality to demonstrate the idea behind the project.

A

Minimum Viable Product (MVP):

78
Q

A model that illustrates the constraints of project management: time, cost, and quality. A manager cannot change one of the constraints without impacting the others.

A

Quality Triangle:

79
Q

A development methodology that focuses on quickly building a working model of the software, getting feedback from users, and then using that feedback to update the working model.

A

Rapid Application Development:

80
Q
  • Preliminary Analysis
  • Systems Analysis
  • Systems Design
  • Programming
  • Testing
  • Implementation
  • Maintenance
A

Systems Development Life Cycle :

81
Q

To ensure that the user can only access the information resources that are appropriate. It determines which users are authorized to read, modify, add, and/or delete information.

A

Access Control:

82
Q

a set of rules applied by the owner, creator or administrator of a
network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be
used.

A

Acceptable Use Policies (AUP):

83
Q

A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.

Example: a fingerprint scan.

A

Biometric Authentication:

84
Q

Attack does exactly what the term suggests: it prevents a web server from servicing authorized users.

A

Denial-of-Service (DoS):

85
Q

Works to provide the functionality to identify if the network is being attacked.

A

Intrusion Detection System (IDS):

86
Q

a method of restricting network access based on the roles of individual users within an enterprise.

A

Role-based access control (RBAC):

87
Q

when criminals lure individuals into sending them personal, confidential data that can be used in crime.

A

Social Engineering:

88
Q

A device that provides battery backup to critical components of the system, allowing the system to stay online longer and/or allowing the IT Staff to shut them down using proper procedures in order to prevent the data loss that might occur from power failure.

A

Universal Power Supply (UPS):

89
Q

allows users who are outside of a corporate network to take a detour around the firewall and access the internal
network from the outside.

A

VPN: A virtual private network

90
Q

The gap between demographics and regions that have access to modern information and communications technology, and those that don’t or have restricted access.

A

Digital Divide:

91
Q

tokenize digital files by creating a digital certificate on the blockchain so that they are unique and owned and cannot be reproduced like other digital files.

A

Non-fungible Tokens (NFT’s):

92
Q

Small files sent by websites to users’ computers, usually without knowledge or specific consent. Can be used to personalize a website, remember users’ preferences, and retain products in electronic shopping carts.

A

Website Cookies:

93
Q

A peer-to-peer network which provides an open, distributed record of transactions between two parties.

A

Blockchain:

94
Q

Stores information on a server, which allows internet users to visit a company’s site and view all of the content.

A

Hosting:

95
Q

When a group of computers are linked together with equal permissions and responsibilities for processing data.

A

peer-to-peer (P2P) networking:

96
Q

where data is collected over some time period and processed together.

A

Batch Processing

97
Q

A systematic approach to making an organization’s workflow more effective, more efficient and more capable of adapting to an ever changing environment.

A

Business Process Management (BPM):

98
Q

All data in an ERP system is stored in a single, central database. Data entered
in one part of the company can be immediately available to other parts of the company.

A

Centralized Database:

99
Q

a technology for managing all your company’s relationships and interactions with customers and potential customers

A

Customer Relationship Management (CRM):

100
Q

the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and invoices.

A

Electronic Data Interchange (EDI):

101
Q

A business process management program that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.

A

Enterprise Resources Planning (ERP):

102
Q

Extracts data from a database to compile reports, such as sales analysis, inventory-level reports, and financial statements, to help managers make routine decisions.

A

Management Information System:

103
Q

System that handles the interconnection between inventory of the products in their various stages of development.

A

Supply Chain Management (SCM):

104
Q

a system that collects, modifies and retrieves business transaction data.

A

Transaction Processing System (TPS):

105
Q

allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly

A

AD Hoc Reporting Tools:

106
Q

three V’s: Volume (size), Variety (# of data types), and Velocity (processing speed).

A

Big Data categorizations:

107
Q

Describes the process that organizations take to collect and analyze data in the hopes of obtaining a competitive advantage.

A

Business Intelligence:

108
Q

Provide regular summaries of information in a predetermined format. They’re often developed by information systems staff and formats can be difficult to alter.

A

Canned Reports:

109
Q

The commitment by an organization to ensuring data and information meet the characteristics of being valuable in order for the organization to meet its objectives.

A

Data Governance:

110
Q

The process of analyzing data to find previously unknown and interesting trends, patterns, and associations in order to make decisions.

A

Data Mining:

111
Q

Type of data visualization that provide a heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics.

A

Dashboards:

112
Q

Customized for executives. These systems provide specific information for strategic decisions.

A

Executive Information System (EIS):

113
Q

Are outdated information systems that were not designed to share data, aren’t compatible with newer technologies, and aren’t aligned with the organization’s current business needs.

A

Legacy Systems:

114
Q

Enhances one’s view of the real world with layers of digital information added to it.

A

Augmented reality (AR):

115
Q

A process that replicates the working mechanism of the human brain in data processing and also creates patterns for decision making.

A

Deep Learning (DL):

116
Q

computer system emulating the decision-making ability of a human expert.

A

Expert Systems (ES):

117
Q

is an umbrella term that covers all forms and combinations of real and virtual environments.

This includes:
augmented reality (AR), virtual reality (VR) and a combination of the two or mixed reality (MR).
A

Extended Reality (XR)

118
Q

physical objects being connected to the Internet, embedded with electronics, software, sensors, and network
connectivity, which enables these objects to collect and exchange data.

A

Internet of Things (IoT):

119
Q

Uses data and algorithms to imitate the way humans learn. Machine learning is used to analyze data and build models without being explicitly programmed to do so.

A

Machine Learning (ML):

120
Q

Allows computers to read, decipher and extract meaning from human language.

A

Natural Language Processing (NLP):

121
Q

Computer interaction in which a real or imagined environment is simulated.

A

Virtual Reality (VR):

122
Q

the ability of the database to allow multiple users access to the same record without adversely affecting transaction processing

A

concurrency:

123
Q

a record within a table

A

instance:

124
Q

a database management system in which information is represented in
the form of objects

A

object-oriented data model:

125
Q

a technical term for row or record

A

tuple:

126
Q

employee identification

A

EID:

127
Q

as the building blocks of a database

A

independent entity or kernel:

128
Q

shows the database development process as a strict sequence of steps where the output of one step is the input to the next

A

waterfall model:

129
Q

English-like statements used to convey the steps of an algorithm or function.

A

pseudocode

130
Q

Symbol used in flowcharting for asking a question and making a decision.

A

Decision symbol = A Diamond

131
Q

A programming design tool that uses graphical elements to visually depict the flow of logic within a function.

A

flowcharting

132
Q

Symbol used in flowcharting for input/output interactions.

A

Input/Output Symbol = A Parallelogram

133
Q

Symbol used in flowcharting for normal processes such as assignment.

A

Process Symbol = A Rectangle

134
Q

Converts source code to object code.

A

Compiler

135
Q

(In Programming) Copy revisions from the current repository to a remote repository.

A

Push

136
Q

(In Programming) Copy revisions from a remote repository to the current repository.

A

Pull

137
Q

(In Programming) A data item whose value cannot change during the program’s execution.

A

constant

138
Q

(In Programming) A data item whose value cannot change during the program’s execution.

A

constant

139
Q

(In Programming) A data item whose value can change during the program’s execution.

A

variable

140
Q

American Standard Code for Information Interchange

A

ASCII

141
Q

Reserved word used to indicate a non-numeric value in a numeric variable.

A

NaN

142
Q

Reserved word used to represent a missing value or invalid value.

A

null

143
Q

The fractional part of a floating-point data type that is dropped when converted to an integer.

A

truncation

144
Q

A part of the computer’s memory used for storage of data.

A

stack

145
Q

Combining two strings into one string.

A

concatenation

146
Q

a technique, which is used for the dissemination of information, articles, etc

A

Really Simple Syndication (RSS)

147
Q

A network management protocol that dynamically assigns IP addresses to devices on a network.

A

Dynamic Host Configuration Protocol (DHCP)

148
Q

A network protocol used to transfer files over the Internet.

A

File Transfer Protocol (FTP)

149
Q

A network node, or router, that connects two networks using different transmission protocols together.

A

Gateway

150
Q

The process that establishes communication between two networking devices.

A

Handshake

151
Q

The underlying protocol that is used by the World Wide Web which defines how messages are formatted and transmitted.

A

Hypertext Transfer Protocol (HTTP)

152
Q

An organization that provides services for accessing the Internet

A

Internet Service Provider (ISP)

153
Q

A unique identifier assigned to a piece of network hardware by the manufacturer.

A

Media Access Control Address (MAC Address)

154
Q

A file storage system that is connected to a network, allowing multiple devices access at the same time.

A

Network Attached Storage (NAS)

155
Q

A connection point for data transmissions over a network.

A

Node

156
Q

A formatted unit of data which consists of control information and user data.

A

Packet

157
Q

A utility used to test whether a device on a network can be contacted.

A

Ping

158
Q

A feature of some routers and switches that prioritizes particular network traffic.

A

Quality of Service (QoS)

159
Q

A piece of networking hardware that is used to connect a local network to the Internet via a Modem and forwards packets of data between networks.

A

Router

160
Q

A secure method for remote login from one computer to another.

A

Secure Shell (SSH)

161
Q

A piece of networking hardware that expands the number of network ports available and is used to connect devices on a network.

A

Switch

162
Q

The address, or location, of a webpage on the Internet.

A

Uniform Resource Locator (URL)

163
Q

A network security standard used to create a secure wireless home network.

A

Wi-Fi Protected Setup (WPS)

164
Q

A malicious application or script that can be used to take advantage of a computer’s vulnerability.

A

Exploit

165
Q

The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

A

Breach

166
Q

An umbrella term that describes all forms of software designed to wreak havoc on a computer.

A

Malware

167
Q

A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.

A

Virus

168
Q

A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.

A

Ransomware

169
Q

A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.

A

Trojan horse

170
Q

A piece of malware that can replicate itself in order to spread the infection to other connected computers

A

Worm

171
Q

A type of malware that functions by seeing user activity without their knowledge. Such as activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.

A

Spyware

172
Q

malware that allows cybercriminals to remotely control your computer.

A

Rootkit

173
Q

Acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

A

DDoS

174
Q

this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.

A

Penetration Testing

175
Q

An audio or video clip that has been edited and manipulated to seem real or believable.

A

Deepfake

176
Q

refers to the innovation that transforms expensive or highly sophisticated products or services—previously accessible to a high-end or more-skilled segment of consumers—to those that are more affordable and accessible to a broader population.

A

Disruptive Innovation