BUS 221 Final Exam

0.0(0)
studied byStudied by 4 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

Data

Raw facts without context.

2
New cards

Information

Processed data that has meaning and value.

3
New cards

Knowledge

Insights gained from information and experience.

4
New cards

Information System

A system that collects, processes, stores, and distributes information.

5
New cards

Components of IS

Hardware, software, data, procedures, and people.

6
New cards

Quality Information

Data that is accurate, timely, relevant, and consistent.

7
New cards

TPS

Information system that handles routine, daily business transactions.

8
New cards

DSS

Supports complex decision-making using models and analysis.

9
New cards

Executive Information System

System for high-level strategic decisions.

10
New cards

What-if Analysis

Evaluates outcomes when variables change.

11
New cards

Random Access Memory (RAM)

Temporary, fast memory used by the CPU. This is temporary storage as opposed to a hard-drive (long-term storage)

12
New cards

Secondary Storage

Permanent storage such as HDDs or SSDs.

13
New cards

CPU

Central Processing Unit that performs instructions.

14
New cards

ALU

Performs arithmetic and logical operations.

15
New cards

Control Unit

Manages and coordinates CPU operations.

16
New cards

Input Device

Hardware used to enter data (keyboard, mouse).

17
New cards

Output Device

Hardware that displays or produces results (monitor, printer).

18
New cards

System Software

Software that manages hardware (operating systems).

19
New cards

Application Software

Programs used for specific tasks.

20
New cards

Database

Organized collection of related data.

21
New cards

DBMS

Software that manages databases.

22
New cards

Table

Collection of related records.

23
New cards

Record

Collection of related fields.

24
New cards

Field

Single piece of data in a record.

25
New cards

Primary Key

Unique identifier for a record.

26
New cards

Structured Data

Data stored in a fixed format (tables).

27
New cards

Unstructured Data

Data without predefined format (emails, videos).

28
New cards

Semi-structured Data

Data with tags/metadata (XML, JSON).

29
New cards

Data Warehouse

Large collection of historical data for analysis.

30
New cards

Privacy

Protection of personal information.

31
New cards

HIPAA

Protects the confidentiality of medical and health information.

32
New cards

COPPA

Protects children's (under the age of 13) online data.

33
New cards

FACTA

Protects consumer credit information from the risks of identity theft.

34
New cards

Social Engineering

Taking advantage of the human element of a security system to trick others into revealing private information.

35
New cards

Phishing

Fraudulent emails that seem to come from legitimate sources used to steal information.

36
New cards

Malware

Malicious software such as viruses or worms.

37
New cards

Virus

Program that attaches to a host file and replicates.

38
New cards

Worm

Self-replicating malware that spreads without user action.

39
New cards

Trojan Horse

Malware disguised as legitimate software.

40
New cards

Authentication

Verifying user identity.

41
New cards

Authorization

Determining access rights.

42
New cards

Encryption

Scrambles data to protect confidentiality.

43
New cards

Firewall

Blocks unauthorized network traffic.

44
New cards

Bandwidth

Maximum data transmission rate.

45
New cards

Latency

Delay in data transmission.

46
New cards

Attenuation

Signal weakening over distance.

47
New cards

LAN

Local Area Network within a small area.

48
New cards

WAN

Wide Area Network across large geographic areas.

49
New cards

Domain Name System (DNS)

Translates domain names to IP addresses.

50
New cards

URL

Address of a web resource.

51
New cards

Intranet

Private network for internal users.

52
New cards

Extranet

Private network extended to partners.

53
New cards

Static Website

A static website is a site where the content does not change unless someone manually updates the files. Each page is prebuilt and served exactly the same way to every visitor — no database or dynamic content generation.

54
New cards

Data-driven Website

A site that pulls its content from a database rather than using fixed, pre-written pages. This means the page can change automatically based on user input, searches, accounts, or updated data—allowing personalized, dynamic, or frequently updated content.

55
New cards

Cloud Computing

On-demand computing resources over the internet.

56
New cards

SaaS

Software delivered online via subscription.

57
New cards

Feasibility Study

Determines viability of a proposed system.

58
New cards

Parallel Conversion

Running old and new systems simultaneously.

59
New cards

Pilot Conversion

New system tested with a small group first.

60
New cards

Phased Conversion

Gradual implementation of new system.

61
New cards

Plunge/Direct Conversion

Immediate switch to the new system.

62
New cards

SCM

Managing flow of goods, information, and finances.

63
New cards

CRM

Managing customer interactions and relationships.

64
New cards

ERP

Integrates all major business processes into one system.

65
New cards

Knowledge Management

Capturing and sharing organizational knowledge.

66
New cards

Structured Decisions

Routine decisions with clear procedures.

67
New cards

Unstructured Decisions

Decisions requiring judgment; no set rules.

68
New cards

Sensitivity Analysis

Examining how changes in one factor affect outcomes.

69
New cards

Machine Learning

Systems that learn patterns from data.

70
New cards

Expert System

Mimics human expert decision-making.

71
New cards

Intelligent Agents

Programs that perform tasks autonomously.

72
New cards

Natural Language Processing (NLP)

Systems that interpret human language.

73
New cards

Robotics

Machines performing physical tasks automatically.

74
New cards

Fuzzy Logic

Reasoning using approximate values.

75
New cards

Virtual Reality

Fully immersive simulated environment.

76
New cards

Augmented Reality

Digital overlays added to the real world.

77
New cards

Blockchain

Distributed, tamper-resistant digital ledger.

78
New cards

Cryptocurrency

Digital currency using blockchain technology.

79
New cards

VPN

This provides a secure "tunnel" through the internet for transmitting messages and data and allows remote users to have a secure connection to an organization's network.

80
New cards

Roaming

Using a cellular phone outside a carrier's limited service area.

81
New cards

Search Engine

An information system that enables users to retrieve data from the Web by using search terms.

82
New cards

Application Service Provider (ASP)

Provides access to various types of software or services for a fee.

83
New cards

Misinformation

Fake information that is distributed to an audience, regardless of intent to mislead

84
New cards

Disinformation

A story or hoax created to intentionally misinform or deceive readers.

85
New cards

Deepfake

Fake videos or audio recordings that look and sound just like real events.

86
New cards

Fake News

Fake information that is knowingly distributed.

87
New cards

Keystroke Loggers

Software or hardware devices that monitor and record keystrokes.

88
New cards

Spoofing

An attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

89
New cards

4 major components of an information system

1. Data

2. Database

3. Process

4. Information

90
New cards

Elements of useful information

1. Timely

2. Integrated with other data

3. Consistent & Accurate

4. Relevant

91
New cards

5 components of a Database Management System (DBMS)

1. Database Engine

2. Data Definition

3. Data Manipulation

4. Application Generation

5. Data Administration

92
New cards

5 Phases of building a successful information system

1. Planning

2. Requirements gathering & analysis

3. Design

4. Implementation

5. Maintenance

93
New cards

5 elements of a feasibility study

1. Economic

2. Technical

3. Operational

4. Scheduling

5. Legal

94
New cards

Volatile Memory

Volatile memory is computer memory that loses its data when power is turned off. The most common example is RAM (Random Access Memory), which temporarily stores data that the CPU is actively using.

95
New cards

Non-volatile Memory

Non-volatile memory is computer storage that retains its data even when the power is turned off. Examples include hard drives, SSDs, USB flash drives, and ROM.

96
New cards

Broadband

A high-speed internet connection that can transmit large amounts of data quickly using multiple channels. It's much faster than traditional dial-up and supports activities like streaming, video calls, and large downloads.

97
New cards

Narrowband

Narrowband is a low-speed data transmission method that provides limited bandwidth and can only send small amounts of data at a time. It's slower than broadband and is typically used for simple, low-data applications like basic texting or older dial-up connections.

98
New cards

Prototyping

A working model or sample version of a system is built quickly, allowing users to see features, give feedback, and suggest changes before the final system is completed. It helps refine requirements early and reduces misunderstandings between users and developers.

99
New cards

Non-Fungible Token (NFT)

One-of-a-kind crypto asset in which each token is unique and backed by a blockchain.