1/43
Flashcards based on Information Systems lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hardware
Physical components of a computer system that can be seen and touched.
Software
Applications that run on hardware, such as Outlook and Word.
Data
Information collected and produced in the software and stored on the hardware.
Procedures
Rules governing how an operation is performed in an information system, including access and what can be seen.
SAAS
Software as a Service, accessible via web browser and priced on a pay-per-use basis.
PAAS
Platform as a Service: Development and deployment environment.
IAAS
Infrastructure as a Service: Servers, storage, and networking, commonly used for business continuity and disaster recovery.
Qualitative Data: Nominal
Data that cannot be measured through numerical units (e.g., red, yellow, blue).
Qualitative Data: Ordinal
Data with a natural ordering (e.g., small, medium, large).
Quantitative Data: Discrete
Integers or whole numbers.
Quantitative Data: Continuous
Fractional numbers with a numeric value.
Application Programming Interface (API)
Software intermediary that allows two applications to communicate with each other.
Open APIs
APIs that any developer can access.
Partner APIs
APIs that only authorized developers may access.
Internal APIs
APIs that only internal teams can access.
Composite APIs
APIs that combine multiple APIs.
REST
Collection of guidelines for lightweight, scalable web APIs.
SOAP
A stricter protocol for more secure APIs.
RPC
A protocol for invoking processes.
Tier 1 Data Reporting
Keep the doors open and support transactions.
Tier 2 Data Reporting
Know the past and current operations and maintain operations.
Tier 3 Data Reporting
Combine internal/external data to provide insight into future operations.
Descriptive Analytics
What happened.
Diagnostic Analytics
Why did it happen.
Predictive Analytics
What will happen.
Prescriptive Analytics
How can we make it happen.
Graphrey
The ability to understand and present information in non-textural formats.
Annual Risk Assessment
Possible mishaps; continuous review and improvement.
Data Governance
Safeguarding the existence, maintaining the access, and disposal of data.
Cybersecurity Best Practices
Strong, unique passwords and two-factor authentication.
Preventing Data Breaches
Investigating, vulnerability assessment, policy and staff training.
Master Data Management (MDM)
Program of operational processes governed and executed on a foundation of people and technology to maintain and deliver master data.
Decentralized
Blockchain control that is decentralized.
Immutability
Blockchain features: immutable and high transparency.
Database
General-purpose data storage, structure: Tables/Segments/Objects.
Blockchain
Cryptocurrencies, Contracts, structure: Blocks strung together.
Performance
Blockchain Performance: Slower, less scalable.
Blockchain Trust
Trustless system.
Blockchain Use Cases
Blockchain Performance: Cryptocurrencies, Contracts.
Non-Fungible Tokens (NFT)
Blockchain-based tokens that represent a unique asset.
Robotic Process Automation (RPA)
Uses software bots to automate repetitive tasks in already automated systems.
Generative AI
Create various types of content including text, images, audio, and video.
Privacy By Design
embed, ownership, AI, accountability, safeguard
Hash
Function that converts an input of letters and numbers into an encrypted output.