Management Information Systems (MIG) Key Terms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

BUSN 101 Key Terms List

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Information Systems

Systems that allow users to leverage technology, information, and people to further organizational goals

2
New cards

Systems

Information technology
Data
Information
Spreadsheet
Database
Database management system
Enterprise Resource Planning (ERP) Systems
Cloud Computing

3
New cards

Information technology

The equipment and techniques used to manage and process information

4
New cards

Data

Raw, unorganized facts that can be moved and stored

5
New cards

Information

Data that has been processed, interpreted, organized, structured, or presented in a way that makes it meaningful or useful

6
New cards

Spreadsheet

A computer application that enables a user to save, sort, and manage data in an arranged form of rows and columns. It allows the entry, calculation, and storage of data in columns and rows

7
New cards

Database

An organized collection of data stored and accessed electronically

8
New cards

Database management system

Software that allows you to quickly and easily enter, store, organize, select, and retrieve data in a database. It tracks the data and allows user to query the database for the information they need

9
New cards

Enterprise Resource Planning (ERP) Systems

A computerized resource-planning system that incorporates information about the firm’s suppliers and customers with its internally generated data

10
New cards

Cloud computing

The delivery of computing services over the internet, allowing for flexible, on-demand access to resources such as software and data storage

11
New cards

Information security

The processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection

12
New cards

Network segmentation

Architectural design of a network to manage security and access

13
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes