1/20
Flashcards covering key terms and concepts from the lectures on databases, information systems, and security practices.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Traditional File Systems
Systems that can't share data, lack security, result in data duplication, and are time-consuming.
Database
A self-describing collection of integrated records that organizes and tracks multiple themes.
DBMS (Database Management System)
A program that creates, processes, and administers databases.
Primary Key
Column(s) that identify a unique row in a table.
Foreign Key
When primary keys exist in another table, allowing for relationships between the tables.
Metadata
Data that describes data, including data type, field name, and field properties.
SQL (Structured Query Language)
The most popular and international standard for processing databases.
Business Processes
A network of activities that generate value by transforming inputs into outputs.
Structured Processes
Processes that support operational and structured managerial decisions.
Dynamic Processes
Processes that support strategic and less structured managerial decisions.
Information Silos
Problems caused by data duplication and disjointed processes within an organization.
Business Process Reengineering (BPR)
The alteration and design of business processes to leverage new information systems.
Customer-Relationship Management (CRM)
Managing all interactions with customers through the customer life cycle phases.
Enterprise Resource Planning Systems (ERP)
A suite of applications for consolidating business operations into a single computer platform.
SDLC (System Development Life Cycle)
The five-phase process for developing information systems.
Agile Development
An approach that expects changes in requirements and emphasizes iterative design and testing.
Account Administration
Management of user accounts and passwords, including help desk policies.
IS Security Safeguards
Measures taken to protect information systems from threats and vulnerabilities.
Threat
A person seeking to obtain or alter data.
Vulnerability
An opportunity for attackers to gain access to information systems.
User Rights and Responsibilities
The rights to reliable internet and training, and responsibilities to follow security procedures.