OMIS 3500 Test 2

5.0(1)
studied byStudied by 64 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/76

flashcard set

Earn XP

Description and Tags

Intro Mgmt information systems Yvette Monistere SELU Fall 2025

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

77 Terms

1
New cards

Ethics

Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior.

2
New cards

Five Moral Dimensions of the Information Age

1. Information rights and obligations.

2. Property rights and obligations.

3. System quality.

4. Accountability and control.

5. Quality of life.

3
New cards

Privacy Definition

The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. It is also the claim to be able to control information about yourself.

4
New cards

What is the claim of individuals to be left alone, free from surveillance or interference

Privacy

5
New cards

Information Rights

Rights that individuals and organizations have with respect to the information that pertains to them.

6
New cards

Fair Information Practices (FIP)

A set of principles, not law, that most US and European privacy law is based on. They are based on the mutuality of interest between the record holder and the individual involved in a transaction.

7
New cards

What set of principles is the basis of most U.S. and European privacy laws?

Fair Information Practices (FIP)

8
New cards

Opt-out

A model of informed consent that permits the collection of personal information until the consumer specifically requests that the data not be collected.

9
New cards

What is the difference between the U.S. and E.U. practices regarding choice/consent?

The U.S. practices opt-out, which permits the collection of personal information until the consumer specifically requests the data not be collected. The European Union practices opt-in, which prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

10
New cards

Opt-in

A model of informed consent that prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

11
New cards

Safe harbor

A private self-regulating policy and enforcement mechanism that meets the objectives of government regulation but does not involve government regulation or enforcement.

12
New cards

GDPR

General Data Protection Regulation

13
New cards

General Data Protection Regulation (GDPR)

Legislation established in 2018 that applies to all firms and organizations that collect, store, or process personal information of EU citizens. Its protections apply worldwide regardless of where the processing of the transaction takes place.

14
New cards

What major privacy legislation was established in 2018 that applies to firms processing personal information of EU citizens worldwide?

The General Data Protection Regulation (GDPR)

15
New cards

What is an exclusive monopoly on the ideas behind an invention, typically for 20 years?

A patent.

16
New cards

What are the three principal sources of poor system performance?

Software bugs and errors, hardware or facility failures (caused by natural or other causes), and poor input data quality.

17
New cards

Intellectual property

Tangible and intangible products of the mind created by individuals or corporations.

18
New cards

What is the most common source of business system issues?

Poor data quality.

19
New cards

What is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulation?

Safe harbor.

20
New cards

Copyright

Protects creators of certain types of intellectual property against copying by others for a certain period of time.

21
New cards

Patents

Grants the owner an exclusive monopoly on the ideas behind an invention for a certain period of time, typically 20 years.

22
New cards

Trademarks

Marks, symbols, or images used to distinguish a product in the marketplace.

23
New cards

Trade secrets

Any intellectual work product used for a business purpose, provided it is not based on information in the public domain.

24
New cards

The three principal sources of poor system performance are:

software bugs and errors, hardware or facility failures (caused by natural or other causes), and poor input data quality.

25
New cards

The most common source of business system issues is

poor data quality.

26
New cards

The digital divide

The disparity in access to computers and the Internet.

27
New cards

Computer crime

Generally defined as the commission of illegal acts through the use of a computer or against a computer system.

28
New cards

Computer abuse

The commission of acts involving a computer that may not be illegal but are considered unethical.

29
New cards

IT infrastructure

Comprises several components designed to work together in developing, controlling, and supporting a business's IT services.

30
New cards

The seven vital components of an IT infrastructure are

hardware platforms, enterprise and software platforms, operating system platforms, data storage management, network and telecommunication platforms, internet platforms, and customer and system integration services.

31
New cards

Hardware Platforms

A group of interconnected hardware elements that combine to run all software applications and are the foundation of the IT infrastructure.

32
New cards

Enterprise and Software Applications

Large-scale proprietary software and other relevant software utilized by a business to run effectively. They instruct the hardware and enable devices to function.

33
New cards

Operating System (OS) Platforms

The software that manages all other applications once it's uploaded onto a computer; it's the primary software that drives all other software and is the main interface for users.

34
New cards

Data Storage and Management

The data center is where software manages and stores a company's information while providing secure access to data and applications.

35
New cards

LAN

Local Area Network

36
New cards

LAN (local area network)

Designed for smaller areas such as offices, homes, or schools.

37
New cards

WAN

Wide Area Network

38
New cards

WAN (wide area network)

Encompasses larger areas such as cities, countries, and even the world.

39
New cards

Cloud Storage

Keeps data on third-party servers in the cloud.

40
New cards

Network and Telecommunication Platforms

Allow network operations, management, and communication between internal and external systems. Offer connection to data through internet access, cellular wireless, and WAN.

41
New cards

Internet Platforms

Hardware and software that work to facilitate the functions of web hosting, web maintenance, and web applications.

42
New cards

Consulting and System Integration Services

Designed to integrate the various components of infrastructure, software, and platforms into a seamless information system that is fast, consistent, and secure.

43
New cards

What comprises several components designed to work together in developing, controlling, and supporting a business's IT services?

Information technology (IT) infrastructure.

44
New cards

Which component is the foundation of the IT infrastructure?

Hardware platforms.

45
New cards

What is the software that manages all other applications and is the main interface for users?

Operating system (OS) platform.

46
New cards

What is the difference between LAN and WAN?

LAN (local area network) is designed for smaller areas such as offices, homes, or schools. WAN (wide area network) encompasses larger areas such as cities, countries, and even the world.

47
New cards

What type of storage keeps data on third-party servers and offers convenience and ease of access anytime and anywhere?

Cloud storage.

48
New cards

Which component allows network operations, management, and communication between internal and external systems?

Network and telecommunication platforms.

49
New cards

What is the purpose of Consulting and System Integration Services?

They are designed to integrate the various components of infrastructure, software, and platforms into a seamless information system that is fast, consistent, and secure. They are critical for merging old legacy systems with newer technologies.

50
New cards

Byte

A single character of data.

51
New cards

Field

A group of characters as word(s) or number(s).

52
New cards

Record

A group of related fields.

53
New cards

File

A group of records of the same type.

54
New cards

Database

A group of related files.

55
New cards

Entity

A person, place, or thing on which we store information.

56
New cards

Attribute

Each characteristic, or quality, describing an entity. Also called a Field or a Column in a table.

57
New cards

Relational Database

The most common type of database that represents data as two-dimensional tables, called relations.

58
New cards

Key field

A field used to uniquely identify each record.

59
New cards

Primary key

The field in a table used for key fields, uniquely identifying each record.

60
New cards

Foreign key

A primary key used in a second table as a look-up field to identify records from the original table.

61
New cards

DBMS

Database Management System

62
New cards

Database Management System (DBMS)

Software that enables an organization to centralize data, manage that data efficiently, and provide access to the stored data by application programs.

63
New cards

RDBMS

Relational DBMS

64
New cards

Relational DBMS (RDBMS)

The most popular type of DBMS today for desktops as well as for larger computers and mainframes.

65
New cards

Basic Operations of a Relational DBMS Steps:

  1. Select

  2. Join

  3. Project

66
New cards

Select (Basic Operations of a Relational DBMS Step 1)

Creates a subset of data of all records that meet a stated criteria.

67
New cards

Join (Basic Operations of a Relational DBMS Step 2)

Combines relational tables to provide the user with more information than is available in the individual tables.

68
New cards

Project (Basic Operations of a Relational DBMS Step 3)

Creates a subset of columns in a table, creating tables with only the information specified.

69
New cards

Arrange the data hierarchy from smallest to largest: field, byte, file, record, database.

Byte , Field , Record , File , Database.

70
New cards

In a relational database, what are the two-dimensional tables called?

Relations.

71
New cards

What is a characteristic or quality describing an entity?

An attribute (also a field or column).

72
New cards

What are the six problems associated with the traditional file environment?

Data redundancy , data inconsistency , program-data dependence , lack of flexibility , poor data security , and inability to share data among applications.

73
New cards

What is a field used in one table as a look-up field to identify records from another table?

A foreign key.

74
New cards

What are the three basic operations of a relational DBMS?

Select, Join, and Project.

75
New cards

Which operation combines relational tables to provide the user with more information than is available in individual tables?

Join

76
New cards

Which operation creates a subset of columns in a table, creating a table with only the information specified?

Project

77
New cards

Which operation creates a subset of data of all records that meet a stated criteria?

Select