MIS Midterm 2

5.0(1)
studied byStudied by 13 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/223

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:59 AM on 4/20/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

224 Terms

1
New cards
Computing Hardware
Physical components of information technology, which includes the computer and the following peripherals: Storage devices Input Devices Output devices
2
New cards
Software
Computer program or collection of programs
3
New cards
Operating System
Software that controls the computer hardware and establishes standards for developing and executing applications
4
New cards
Applications
desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations
5
New cards
Layering Cake (Top to Bottom)
User, Application, Operating System, Hardware
6
New cards
User Interface
Items like scroll bars and menus are displayed on the hardware of the computer display
7
New cards
Firmware
Software stored on nonvolatile memory chips
8
New cards
Embedded Systems

\
Special-purpose software designed and included inside physical products
9
New cards
Platform
Products and services that allow for the development and integration of software products and other complementary goods
10
New cards
Desktop Software
Applications installed on a personal computer, typically supporting tasks performed by a single user
11
New cards
Desktop Software
Applications installed on a personal computer, typically supporting tasks performed by a single user
12
New cards
Enterprise Software
Applications that address the needs of multiple users throughout an organization or work group
13
New cards
Software Package
Software product offered commercially by a third party
14
New cards
Enterprise Resource Planning (ERP)
Software package that integrates the many functions of a business (includes Sales and Inventory, Manufacturing and Purchasing, Human Resources)
15
New cards
Customer Relationship Management (CRM)
Systems used to support customer-related sales and marketing activities
16
New cards
Supply Chain Management (SCM)
Systems that can help a firm manage aspects of its value chain through delivery
17
New cards
Marginal Costs
The costs associated with each additional unit produced
18
New cards
open source software (OSS)
Software that is free and where anyone can look at and potentially modify the code
19
New cards
cloud computing
replacing computing with services provided over the Internet
20
New cards
software as a service (SaaS)
A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online
21
New cards
Virtualization
Technology that can make a single computer behave like many separate computers. Helps consolidate computing resources and creates additional savings and efficiencies
22
New cards
Linux
An open source software operating system
23
New cards
LAMP
Linux, Apache Web server software, MySQL database, and any of the several programming languages that start with P (e.g., Perl/Python/PHP).
24
New cards
Security-focused
Technology products that contain particularly strong security features
25
New cards
Scalability
Ability to either handle increasing workloads or to be easily expanded to manage workload increases
26
New cards
Total Cost of Ownership (TCO)
All of the costs associated with the design, development, testing, implementation, documentation, training, and maintenance of a software system
27
New cards
utility computing
Firm develops its own software and then runs it over the Internet on a service provider’s computers
28
New cards
Platform as a service (PaaS)
Cloud providers offer services for customers to build their own applications on the provider’s infrastructure. Services include hardware, operating system, tools, and hosting
29
New cards
Infrastructure as a service (IaaS)
Cloud providers offer services that include running the remote hardware, storage, and networking. Client firms can choose the software used
30
New cards
Cloudbursting
Use of cloud computing to provide excess capacity during periods of spiking demand. It is a scalability solution that is provided as an overflow service, kicking in as needed
31
New cards
Black Swans
Events that cannot be predicted but can cause an impact. Scalable computing resources can help a firm deal with spiking impact from Black swan events
32
New cards
Sever farm
A massive network of computer servers running software to coordinate their collective use. Provide the infrastructure backbone to SaaS, hardware cloud efforts, and many large-scale Internet services
33
New cards
Virtualization
A type of software that allows a single computer or cluster of connected computers to function as if it were several different computers
34
New cards
Containers
A type of virtualization that allows for shared operating systems for more resource savings and faster execution
35
New cards
virtual desktops
Running an instance of a PC’s software on another machine and delivering the image of what is executing to the remote device
36
New cards
data harvesters
Cybercriminals who infiltrate systems and collect data for illegal resale
37
New cards
cash-out fraudsters
Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods using stolen credit cards or create false accounts.
38
New cards
botnets
Hordes of surreptitiously infiltrated computers, controlled remotely
39
New cards
distributed denial of service (DDoS) attacks
Shutting down websites with a crushing load of seemingly legitimate requests
40
New cards
hacktivists
Protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
41
New cards
Hacker
A term that may be applied to either 1) someone who breaks into a computer, or 2) to a particularly clever programmer
42
New cards
white hat hackers
Someone who uncovers computer weaknesses without exploiting them. Contribute to improving system security. Share their knowledge in hopes that security will be improved
43
New cards
black hat hackers
Computer criminals
44
New cards
Phishing
Cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software
45
New cards
spoofed
Email transmissions and packets that have been altered to forge or disguise their origin or identity
46
New cards
zero-day exploits
New attacks that haven’t been clearly identified and haven’t been incorporated into security screening systems
47
New cards
biometrics
Measure and analyze human body characteristics for identification or authentication
48
New cards
multi-factor authentication
When identity is proven by presenting more than one item for proof of credentials
49
New cards
dumpster diving
Combing through trash to identify valuable assets
50
New cards
shoulder surfing
Gaining compromising information through observation
51
New cards
encryption
Scrambling data using a code, thereby hiding it from those who do not have the unlocking key
52
New cards
key
Code that unlocks encryption
53
New cards
brute-force attacks
Exhausts all possible password combinations to break into an account
54
New cards
public key encryption
Two key system used for securing electronic transmissions
55
New cards
certificate authority
Trusted third party that provides authentication services in public key encryption schemes
56
New cards
firewalls
Control network traffic, block unauthorized traffic
57
New cards
intrusion detection systems
Monitor network use for hacking attempts and take preventive action
58
New cards
honeypots
Tempting, bogus targets meant to lure hackers
59
New cards
blacklists
Deny the entry of specific IP addresses and other entities
60
New cards
whitelists
Permit communication only with approved entities or in an approved manner
61
New cards
bad apples
Rogue employees who steal secrets, install malware, or hold a firm hostage
62
New cards
Social Engineering
Con games that trick employees into revealing information or performing other tasks that compromise a firm
63
New cards
Voice-print
Technology that identifies users via unique characteristics in speech
64
New cards
CAPTCHAs
An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.
65
New cards
Push-Button Hacking
Tools to make it easy for criminals to automate attacks
66
New cards
Business Intelligence
A term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis
67
New cards
Analytics
A term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions
68
New cards
Machine Learning
A type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions that predictions on their own without additional programming
69
New cards
Dynamic Pricing
Changing pricing based on demand conditions
70
New cards
Data
raw facts and figures
71
New cards
Information
Data presented in a context so that it can answer a question or support decision-making
72
New cards
Knowledge
Insight derived from experience and expertise (based on data and information)
73
New cards
Database
A single table or a collection of related tables
74
New cards
database management systems (DBMS)
Sometimes referred to as database software; software for creating, maintaining, and manipulating data
75
New cards
Structured query language (SQL)
A language used to create and manipulate databases
76
New cards
Database Administrator (DBA)
Job focused on directing, performing, or overseeing activities associated with a database or set of databases. These may include but not limited to: database design, creation, implementation, maintenance, backup and recovery, policy setting and enforcement, and security
77
New cards
Table or File
A list of data, arranged in columns and rows
78
New cards
column or field
In a database table andrepresent each category of data contained in a record
79
New cards
row or record
In a database table and represent a single instance of whatever the table keeps track of
80
New cards
Relational Databases
The most common standard for expressing databases, whereby tables (files) are related based on common keys
81
New cards
Serverless Computing
A type of cloud computing where a third-party vendor manages servers, replication, fault-tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building “Business Solutions” and eliminating the need to spend time and resources managing the technology complexity of much of the underlying “IT Solution”
82
New cards
Transaction Processing Systems (TPS)
Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return
83
New cards
Transaction
Some kind of business exchange
84
New cards
Loyalty Program / Loyalty Card
Systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity. In addition to enhancing data collection, loyalty cards can represent a significant switching cost
85
New cards
Artificial Intelligence
Computer software that seeks to reproduce or mimic (perhaps with improvements) human thought, decision-making, or brain functions
86
New cards
Data aggregators
Firms that collect and resell data
87
New cards
Legacy Systems
Older information systems that are often incompatible with other systems, technologies, and ways of conducting business. Incompatible legacy systems can be a major roadblock to turning data into information, and they can inhibit firm agility, holding back operational and strategic initiatives
88
New cards
Data warehouse
A set of databases designed to support decision-making in an organization
89
New cards
Data mart
A database or databases focused on addressing the concerns of a specific problem (e.g., increasing customer retention, improving product quality) or business unit (e.g., marketing, engineering)
90
New cards
Online Analytical Processing (OLAP)
A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube
91
New cards
Data Cube
A special database used to store data in OLAP reporting
92
New cards
Data Lake
A catch-all term for storage and access technologies used in Big Data. Are systems that allow for the storage of data in both structured as well as "raw," "unfiltered" formats. Also provide the tools to "pipe out" data, filter it, and refine it so that it can be turned into information
93
New cards
Hadoop
A set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation
94
New cards
data cloud
Sometimes referred to as cloud data warehousing, this term refers to a cloud service that provides tools to extract and transform data from disparate sources so that it can be interrogated as need
95
New cards
ETL (Extract Transform Load)
copying data from multiple, disparately organized data sources, transforming (or cleaning) the data into a common format, and loading it into a combined usable format. Is a key step in getting data into a data warehouse or data mart
96
New cards
Snowflake
Is a cloud-hosted relational database for building data warehouses
97
New cards
e-discovery
The process of identifying and retrieving relevant electronic information to support litigation efforts
98
New cards
Query tools
A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria
99
New cards
Python
A general purpose programming language that is also popular for data analytics
100
New cards
R
A programming language specifically created for analytics, statistical, and graphical computing