Information Systems Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Flashcards based on Information Systems lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Hardware

Physical components of a computer system that can be seen and touched.

2
New cards

Software

Applications that run on hardware, such as Outlook and Word.

3
New cards

Data

Information collected and produced in the software and stored on the hardware.

4
New cards

Procedures

Rules governing how an operation is performed in an information system, including access and what can be seen.

5
New cards

SAAS

Software as a Service, accessible via web browser and priced on a pay-per-use basis.

6
New cards

PAAS

Platform as a Service: Development and deployment environment.

7
New cards

IAAS

Infrastructure as a Service: Servers, storage, and networking, commonly used for business continuity and disaster recovery.

8
New cards

Qualitative Data: Nominal

Data that cannot be measured through numerical units (e.g., red, yellow, blue).

9
New cards

Qualitative Data: Ordinal

Data with a natural ordering (e.g., small, medium, large).

10
New cards

Quantitative Data: Discrete

Integers or whole numbers.

11
New cards

Quantitative Data: Continuous

Fractional numbers with a numeric value.

12
New cards

Application Programming Interface (API)

Software intermediary that allows two applications to communicate with each other.

13
New cards

Open APIs

APIs that any developer can access.

14
New cards

Partner APIs

APIs that only authorized developers may access.

15
New cards

Internal APIs

APIs that only internal teams can access.

16
New cards

Composite APIs

APIs that combine multiple APIs.

17
New cards

REST

Collection of guidelines for lightweight, scalable web APIs.

18
New cards

SOAP

A stricter protocol for more secure APIs.

19
New cards

RPC

A protocol for invoking processes.

20
New cards

Tier 1 Data Reporting

Keep the doors open and support transactions.

21
New cards

Tier 2 Data Reporting

Know the past and current operations and maintain operations.

22
New cards

Tier 3 Data Reporting

Combine internal/external data to provide insight into future operations.

23
New cards

Descriptive Analytics

What happened.

24
New cards

Diagnostic Analytics

Why did it happen.

25
New cards

Predictive Analytics

What will happen.

26
New cards

Prescriptive Analytics

How can we make it happen.

27
New cards

Graphrey

The ability to understand and present information in non-textural formats.

28
New cards

Annual Risk Assessment

Possible mishaps; continuous review and improvement.

29
New cards

Data Governance

Safeguarding the existence, maintaining the access, and disposal of data.

30
New cards

Cybersecurity Best Practices

Strong, unique passwords and two-factor authentication.

31
New cards

Preventing Data Breaches

Investigating, vulnerability assessment, policy and staff training.

32
New cards

Master Data Management (MDM)

Program of operational processes governed and executed on a foundation of people and technology to maintain and deliver master data.

33
New cards

Decentralized

Blockchain control that is decentralized.

34
New cards

Immutability

Blockchain features: immutable and high transparency.

35
New cards

Database

General-purpose data storage, structure: Tables/Segments/Objects.

36
New cards

Blockchain

Cryptocurrencies, Contracts, structure: Blocks strung together.

37
New cards

Performance

Blockchain Performance: Slower, less scalable.

38
New cards

Blockchain Trust

Trustless system.

39
New cards

Blockchain Use Cases

Blockchain Performance: Cryptocurrencies, Contracts.

40
New cards

Non-Fungible Tokens (NFT)

Blockchain-based tokens that represent a unique asset.

41
New cards

Robotic Process Automation (RPA)

Uses software bots to automate repetitive tasks in already automated systems.

42
New cards

Generative AI

Create various types of content including text, images, audio, and video.

43
New cards

Privacy By Design

embed, ownership, AI, accountability, safeguard

44
New cards

Hash

Function that converts an input of letters and numbers into an encrypted output.