1/98
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Data
Raw facts without context.
Information
Processed data that has meaning and value.
Knowledge
Insights gained from information and experience.
Information System
A system that collects, processes, stores, and distributes information.
Components of IS
Hardware, software, data, procedures, and people.
Quality Information
Data that is accurate, timely, relevant, and consistent.
TPS
Information system that handles routine, daily business transactions.
DSS
Supports complex decision-making using models and analysis.
Executive Information System
System for high-level strategic decisions.
What-if Analysis
Evaluates outcomes when variables change.
Random Access Memory (RAM)
Temporary, fast memory used by the CPU. This is temporary storage as opposed to a hard-drive (long-term storage)
Secondary Storage
Permanent storage such as HDDs or SSDs.
CPU
Central Processing Unit that performs instructions.
ALU
Performs arithmetic and logical operations.
Control Unit
Manages and coordinates CPU operations.
Input Device
Hardware used to enter data (keyboard, mouse).
Output Device
Hardware that displays or produces results (monitor, printer).
System Software
Software that manages hardware (operating systems).
Application Software
Programs used for specific tasks.
Database
Organized collection of related data.
DBMS
Software that manages databases.
Table
Collection of related records.
Record
Collection of related fields.
Field
Single piece of data in a record.
Primary Key
Unique identifier for a record.
Structured Data
Data stored in a fixed format (tables).
Unstructured Data
Data without predefined format (emails, videos).
Semi-structured Data
Data with tags/metadata (XML, JSON).
Data Warehouse
Large collection of historical data for analysis.
Privacy
Protection of personal information.
HIPAA
Protects the confidentiality of medical and health information.
COPPA
Protects children's (under the age of 13) online data.
FACTA
Protects consumer credit information from the risks of identity theft.
Social Engineering
Taking advantage of the human element of a security system to trick others into revealing private information.
Phishing
Fraudulent emails that seem to come from legitimate sources used to steal information.
Malware
Malicious software such as viruses or worms.
Virus
Program that attaches to a host file and replicates.
Worm
Self-replicating malware that spreads without user action.
Trojan Horse
Malware disguised as legitimate software.
Authentication
Verifying user identity.
Authorization
Determining access rights.
Encryption
Scrambles data to protect confidentiality.
Firewall
Blocks unauthorized network traffic.
Bandwidth
Maximum data transmission rate.
Latency
Delay in data transmission.
Attenuation
Signal weakening over distance.
LAN
Local Area Network within a small area.
WAN
Wide Area Network across large geographic areas.
Domain Name System (DNS)
Translates domain names to IP addresses.
URL
Address of a web resource.
Intranet
Private network for internal users.
Extranet
Private network extended to partners.
Static Website
A static website is a site where the content does not change unless someone manually updates the files. Each page is prebuilt and served exactly the same way to every visitor — no database or dynamic content generation.
Data-driven Website
A site that pulls its content from a database rather than using fixed, pre-written pages. This means the page can change automatically based on user input, searches, accounts, or updated data—allowing personalized, dynamic, or frequently updated content.
Cloud Computing
On-demand computing resources over the internet.
SaaS
Software delivered online via subscription.
Feasibility Study
Determines viability of a proposed system.
Parallel Conversion
Running old and new systems simultaneously.
Pilot Conversion
New system tested with a small group first.
Phased Conversion
Gradual implementation of new system.
Plunge/Direct Conversion
Immediate switch to the new system.
SCM
Managing flow of goods, information, and finances.
CRM
Managing customer interactions and relationships.
ERP
Integrates all major business processes into one system.
Knowledge Management
Capturing and sharing organizational knowledge.
Structured Decisions
Routine decisions with clear procedures.
Unstructured Decisions
Decisions requiring judgment; no set rules.
Sensitivity Analysis
Examining how changes in one factor affect outcomes.
Machine Learning
Systems that learn patterns from data.
Expert System
Mimics human expert decision-making.
Intelligent Agents
Programs that perform tasks autonomously.
Natural Language Processing (NLP)
Systems that interpret human language.
Robotics
Machines performing physical tasks automatically.
Fuzzy Logic
Reasoning using approximate values.
Virtual Reality
Fully immersive simulated environment.
Augmented Reality
Digital overlays added to the real world.
Blockchain
Distributed, tamper-resistant digital ledger.
Cryptocurrency
Digital currency using blockchain technology.
VPN
This provides a secure "tunnel" through the internet for transmitting messages and data and allows remote users to have a secure connection to an organization's network.
Roaming
Using a cellular phone outside a carrier's limited service area.
Search Engine
An information system that enables users to retrieve data from the Web by using search terms.
Application Service Provider (ASP)
Provides access to various types of software or services for a fee.
Misinformation
Fake information that is distributed to an audience, regardless of intent to mislead
Disinformation
A story or hoax created to intentionally misinform or deceive readers.
Deepfake
Fake videos or audio recordings that look and sound just like real events.
Fake News
Fake information that is knowingly distributed.
Keystroke Loggers
Software or hardware devices that monitor and record keystrokes.
Spoofing
An attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
4 major components of an information system
1. Data
2. Database
3. Process
4. Information
Elements of useful information
1. Timely
2. Integrated with other data
3. Consistent & Accurate
4. Relevant
5 components of a Database Management System (DBMS)
1. Database Engine
2. Data Definition
3. Data Manipulation
4. Application Generation
5. Data Administration
5 Phases of building a successful information system
1. Planning
2. Requirements gathering & analysis
3. Design
4. Implementation
5. Maintenance
5 elements of a feasibility study
1. Economic
2. Technical
3. Operational
4. Scheduling
5. Legal
Volatile Memory
Volatile memory is computer memory that loses its data when power is turned off. The most common example is RAM (Random Access Memory), which temporarily stores data that the CPU is actively using.
Non-volatile Memory
Non-volatile memory is computer storage that retains its data even when the power is turned off. Examples include hard drives, SSDs, USB flash drives, and ROM.
Broadband
A high-speed internet connection that can transmit large amounts of data quickly using multiple channels. It's much faster than traditional dial-up and supports activities like streaming, video calls, and large downloads.
Narrowband
Narrowband is a low-speed data transmission method that provides limited bandwidth and can only send small amounts of data at a time. It's slower than broadband and is typically used for simple, low-data applications like basic texting or older dial-up connections.
Prototyping
A working model or sample version of a system is built quickly, allowing users to see features, give feedback, and suggest changes before the final system is completed. It helps refine requirements early and reduces misunderstandings between users and developers.
Non-Fungible Token (NFT)
One-of-a-kind crypto asset in which each token is unique and backed by a blockchain.