1/68
Comprehensive vocabulary flashcards covering Organization Management, Information Systems, SDLC, E-Commerce, ERP, BCP, and IT Laws.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Based Information Systems (CBIS)
Information systems that use computer technology to process data and are essential for efficiently running large-scale, multi-branch, and internationally competitive organizations.
Security Triad (CIA)
The three primary goals of Information Security: Confidentiality, Integrity, and Availability.
Confidentiality
Ensuring that information is not disclosed to unauthorized individuals, often promoted using tools like encryption, access control lists (ACLs), and passwords.
Integrity
Making sure information has not been changed from how it was intended to be, protecting it from malicious software like worms, viruses, and trojans, or accidental errors.
Availability
Ensuring that information and systems are available for use when needed, focusing on system uptime and recovery from issues like natural disasters.
Unstructured Decisions
Decisions in which the decision-maker must provide judgment, evaluation, and insights into the problem definition, typically occurring at higher organizational levels.
Structured Decisions
Repetitive and routine decisions where decision-makers can follow a definite procedure, commonly found at lower organizational levels.
Semi-structured Decisions
Decisions in which only part of the problem has a clear-cut answer provided by an accepted procedure.
IT Governance
A structure for aligning IT strategy with business strategy to ensure companies achieve goals and possess measurable results for all stakeholders.
CoBIT
A popular framework for IT governance from ISACA, accepted worldwide and well-suited for organizations focused on risk management and mitigation.
ITIL
The Information Technology Infrastructure Library from the UK government, offering eight sets of management procedures focused on operations.
System
A group of interconnected components (input, processing, storage, and output) working toward a common goal through ordered transformation.
Open System
A system that actively interacts with other systems and its environment through exchange relationships.
Closed System
A self-contained system that does not interact or make exchanges across its boundaries with its environment.
Deterministic System
A system that operates in a predictable manner, such as software performing a set of instructions.
Probabilistic System
A system described in terms of probable behavior where exact values at any given time are unknown, such as an inventory system.
Transaction Processing Systems (TPS)
Operational level systems that manipulate data from business transactions like sales, purchases, and payments.
Knowledge Management System (KMS)
An IT system used to store, retrieve, and share organizational knowledge to achieve objectives and gain competitive advantage.
Explicit Knowledge
Knowledge that is easily formalized, articulated, codified, and documented, such as online tutorials or policy manuals.
Tacit Knowledge
Personal, context-specific knowledge represented as intuition or beliefs that is difficult to document or communicate.
Management Information System (MIS)
An integrated user-machine system designed to provide summarized reports to mid-level management to support ongoing operations and routine decisions.
Decision Support System (DSS)
An interactive software-based system intended to help decision-makers solve semi-structured and unstructured problems using data and business models.
Executive Information Systems (EIS)
A tool providing top-level managers with rapid, on-line access to timely, accurate, and actionable summary data about business aspects.
Expert Systems
A highly developed DSS that imitation the reasoning processes of human experts to provide advice and solve problems in specific domains.
Artificial Intelligence (AI)
The science and engineering of making intelligent machines and computer programs that can simulate human abilities to think, see, hear, and feel.
Fuzzy Logic
A form of many-valued logic handling partial truth, where truth values range between 0 and 1.
Genetic Algorithms
Software that uses Darwinian evolutionary processes (survival of the fittest) to simulate and generate increasingly better solutions to complex problems.
Software Development Life Cycle (SDLC)
A process framework defining tasks performed at each step to design, develop, and test high-quality software.
Waterfall Model
A linear-sequential SDLC model where each phase must be completed before the next begins, and phases do not overlap.
Spiral Model
An SDLC model combining design and prototyping elements with a heavy emphasis on risk analysis, primarily used for complex and large projects.
Agile Methodology
A software development process based on iterative and incremental development where requirements and solutions evolve through cross-functional team collaboration.
Feasibility Study
A process carried out by system analysts to evaluate alternative systems through cost/benefit analysis across dimensions like technical, financial, and legal.
Unit Testing
A software verification method where a programmer tests individual units of source code (the smallest testable parts) for fitness for use.
Alpha Testing
The first stage of user acceptance testing, typically performed by users within the organization.
Beta Testing
The last stage of testing, generally performed by external users to provide real-world exposure for the product.
Direct Changeover
A conversion strategy where the old system is dropped and the new system is put into use on a specified date.
Parallel Conversion
A conversion strategy where the old and new systems are run simultaneously for a period to ensure the reliability of the new results.
Post Implementation Review
An evaluation conducted typically 6 weeks to 6 months after deployment to ascertain if the project met its business objectives and delivered planned benefits.
Corrective Maintenance
The process of fixing bugs in the code or defects found by users after the system is in operation.
Adaptive Maintenance
Adapting software to changes in the environment, such as new hardware, operating systems, or government policies.
CASE Tools
Computer-Aided Software Engineering tools that provide automated facilities for producing charts, generating code, and creating documentation to increase productivity.
E-Commerce
The buying and selling of goods/services or transmitting funds/data over electronic networks, primarily the Internet.
Business-to-Consumer (B2C)
A form of e-commerce where businesses develop electronic marketplaces to sell products and services directly to customers.
Digital Wallet
A tool that securely stores credit card and owner identification information to make web purchases more efficient.
Electronic Funds Transfer (EFT)
A system of transferring money from one bank account directly to another without paper money changing hands.
Enterprise Resource Planning (ERP)
A fully integrated business management system that automates many internal business processes across logistics, production, finance, and HR functions.
Supply Chain Management (SCM)
The centralized management of the flow of goods and services, including all processes that transform raw materials into final products.
Reverse Logistics
The process of moving goods from their final destination back to the point of origin to recapture value or ensure proper disposal.
Business Continuity Planning (BCP)
A detailed plan to make sure business processes and systems continue operating in the event of a natural or man-made disaster.
Disaster Recovery Plan (DRP)
A strategy focused on the technical issues involved in restoring computing and communications services after they have been disrupted.
Cold Site
An alternate processing facility that has all infrastructure (power, air conditioning) but lacks the actual computer hardware, which must be provided by the organization.
Hot Site
A fully operational alternate processing facility inclusive of hardware, software, and data for immediate recovery.
Cloud Computing
Delivery of computing services like servers, storage, and applications over the Internet as a networked service.
Infrastructure as a Service (IaaS)
A cloud model providing hardware-level resources (processing power, memory, storage) for users to run applications on demand.
Platform as a Service (PaaS)
A cloud model providing users the ability to develop and deploy applications on an online development platform.
Software as a Service (SaaS)
A cloud model where consumers access software applications over the Internet, often on a subscription basis or as software-on-demand.
Virtualization
The abstraction of computer resources making a single physical resource appear as multiple virtual ones, or vice versa.
Virtual Organisation
A network of cooperation made possible by ICT where horizontal and vertical boundaries are removed, consisting of physically dispersed knowledge workers.
Patent
An exclusive right granted for a limited period (typically 20 years) in exchange for public disclosure of an invention.
Trademark
A sign, word, or logo capable of distinguishing the goods or services of one enterprise from those of others.
Copyright
A legal right granted to creators of original works for exclusive use and distribution, typically for the author\'s life plus additional decades.
Digital Signature
A mathematical technique used to validate the authenticity and integrity of a message or digital document.
XML
Extensible Markup Language; a tool used to store and transport data in a format that is both human-readable and machine-readable.
XBRL
Extensible Business Reporting Language; an open standard for describing financial and non-financial information in a machine-readable format.
Data Diddling
Changing data before, during, or after it is entered into the system to delete, alter, or add key system data.
Salami Technique
A fraud technique where tiny slices of money are stolen over a period of time by increasing expenses by a fraction of a percent.
Social Engineering
A technique where a perpetrator tricks an employee into giving out information needed to access a system.
Intrusion Detection System (IDS)
Security software designed to alert administrators when a system is being compromised through malicious activity.
Audit Trail
Logs designed to record chronological activities at the system, application, and user level to ensure accountability.