Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
Exam 1 Added Info
Studied by 0 people
0.0
(0)
Add a rating
View linked note
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 66
There's no tags or description
Looks like no one added any tags here yet for you.
67 Terms
View all (67)
Star these 67
1
What is an Information System?
An interrelated set of components working together to collect, process, store, and disseminate information.
New cards
2
Competitive Advantage
The ability to generate more sales and achieve superior profit margins through cost leadership, differentiation, or focus.
New cards
3
Leavitt’s Diamond Model
A framework used to introduce new information systems aiming to reduce stress, enhance teamwork, and improve implementation.
New cards
4
Personal Information System
An information system that improves the productivity of individual users for stand-alone tasks.
New cards
5
Strategic Planning
A managerial process to identify initiatives and projects aligned with organizational objectives.
New cards
6
Chief Information Officer (CIO)
The executive responsible for achieving organizational goals using the resources of the information systems department.
New cards
7
RAM (Random Access Memory)
Temporary volatile storage used for data and program execution.
New cards
8
Cache Memory
High-speed memory that processors can access more quickly than main memory.
New cards
9
Thin Clients
Low-cost, centrally managed computers with no internal or external drives for data storage.
New cards
10
Server
A computer that supports multiple users performing specific tasks.
New cards
11
IP Address
A unique identifier for computers, typically expressed as a 32-bit number.
New cards
12
Virtual Private Network (VPN)
A secure connection between two internet points, encapsulating traffic using IP packets.
New cards
13
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
New cards
14
Malware
Malicious software designed to harm or exploit any programmable device or network.
New cards
15
Encryption
The process of converting plaintext into ciphertext to restrict access to authorized parties only.
New cards
16
Asymmetric Algorithms
Encryption methods that use a pair of keys: a public key for encryption and a private key for decryption.
New cards
17
Two-Factor Authentication (2FA)
An extra layer of security requiring not just a password and username but also something that only the user has.
New cards
18
New cards
19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards
65
New cards
66
New cards
67
New cards