MIS Midterm 2

studied byStudied by 13 people
5.0(1)
get a hint
hint

Computing Hardware

1 / 223

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

224 Terms

1

Computing Hardware

Physical components of information technology, which includes the computer and the following peripherals: Storage devices Input Devices Output devices

New cards
2

Software

Computer program or collection of programs

New cards
3

Operating System

Software that controls the computer hardware and establishes standards for developing and executing applications

New cards
4

Applications

desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations

New cards
5

Layering Cake (Top to Bottom)

User, Application, Operating System, Hardware

New cards
6

User Interface

Items like scroll bars and menus are displayed on the hardware of the computer display

New cards
7

Firmware

Software stored on nonvolatile memory chips

New cards
8

Embedded Systems

Special-purpose software designed and included inside physical products

New cards
9

Platform

Products and services that allow for the development and integration of software products and other complementary goods

New cards
10

Desktop Software

Applications installed on a personal computer, typically supporting tasks performed by a single user

New cards
11

Desktop Software

Applications installed on a personal computer, typically supporting tasks performed by a single user

New cards
12

Enterprise Software

Applications that address the needs of multiple users throughout an organization or work group

New cards
13

Software Package

Software product offered commercially by a third party

New cards
14

Enterprise Resource Planning (ERP)

Software package that integrates the many functions of a business (includes Sales and Inventory, Manufacturing and Purchasing, Human Resources)

New cards
15

Customer Relationship Management (CRM)

Systems used to support customer-related sales and marketing activities

New cards
16

Supply Chain Management (SCM)

Systems that can help a firm manage aspects of its value chain through delivery

New cards
17

Marginal Costs

The costs associated with each additional unit produced

New cards
18

open source software (OSS)

Software that is free and where anyone can look at and potentially modify the code

New cards
19

cloud computing

replacing computing with services provided over the Internet

New cards
20

software as a service (SaaS)

A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online

New cards
21

Virtualization

Technology that can make a single computer behave like many separate computers. Helps consolidate computing resources and creates additional savings and efficiencies

New cards
22

Linux

An open source software operating system

New cards
23

LAMP

Linux, Apache Web server software, MySQL database, and any of the several programming languages that start with P (e.g., Perl/Python/PHP).

New cards
24

Security-focused

Technology products that contain particularly strong security features

New cards
25

Scalability

Ability to either handle increasing workloads or to be easily expanded to manage workload increases

New cards
26

Total Cost of Ownership (TCO)

All of the costs associated with the design, development, testing, implementation, documentation, training, and maintenance of a software system

New cards
27

utility computing

Firm develops its own software and then runs it over the Internet on a service provider’s computers

New cards
28

Platform as a service (PaaS)

Cloud providers offer services for customers to build their own applications on the provider’s infrastructure. Services include hardware, operating system, tools, and hosting

New cards
29

Infrastructure as a service (IaaS)

Cloud providers offer services that include running the remote hardware, storage, and networking. Client firms can choose the software used

New cards
30

Cloudbursting

Use of cloud computing to provide excess capacity during periods of spiking demand. It is a scalability solution that is provided as an overflow service, kicking in as needed

New cards
31

Black Swans

Events that cannot be predicted but can cause an impact. Scalable computing resources can help a firm deal with spiking impact from Black swan events

New cards
32

Sever farm

A massive network of computer servers running software to coordinate their collective use. Provide the infrastructure backbone to SaaS, hardware cloud efforts, and many large-scale Internet services

New cards
33

Virtualization

A type of software that allows a single computer or cluster of connected computers to function as if it were several different computers

New cards
34

Containers

A type of virtualization that allows for shared operating systems for more resource savings and faster execution

New cards
35

virtual desktops

Running an instance of a PC’s software on another machine and delivering the image of what is executing to the remote device

New cards
36

data harvesters

Cybercriminals who infiltrate systems and collect data for illegal resale

New cards
37

cash-out fraudsters

Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods using stolen credit cards or create false accounts.

New cards
38

botnets

Hordes of surreptitiously infiltrated computers, controlled remotely

New cards
39

distributed denial of service (DDoS) attacks

Shutting down websites with a crushing load of seemingly legitimate requests

New cards
40

hacktivists

Protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage

New cards
41

Hacker

A term that may be applied to either 1) someone who breaks into a computer, or 2) to a particularly clever programmer

New cards
42

white hat hackers

Someone who uncovers computer weaknesses without exploiting them. Contribute to improving system security. Share their knowledge in hopes that security will be improved

New cards
43

black hat hackers

Computer criminals

New cards
44

Phishing

Cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software

New cards
45

spoofed

Email transmissions and packets that have been altered to forge or disguise their origin or identity

New cards
46

zero-day exploits

New attacks that haven’t been clearly identified and haven’t been incorporated into security screening systems

New cards
47

biometrics

Measure and analyze human body characteristics for identification or authentication

New cards
48

multi-factor authentication

When identity is proven by presenting more than one item for proof of credentials

New cards
49

dumpster diving

Combing through trash to identify valuable assets

New cards
50

shoulder surfing

Gaining compromising information through observation

New cards
51

encryption

Scrambling data using a code, thereby hiding it from those who do not have the unlocking key

New cards
52

key

Code that unlocks encryption

New cards
53

brute-force attacks

Exhausts all possible password combinations to break into an account

New cards
54

public key encryption

Two key system used for securing electronic transmissions

New cards
55

certificate authority

Trusted third party that provides authentication services in public key encryption schemes

New cards
56

firewalls

Control network traffic, block unauthorized traffic

New cards
57

intrusion detection systems

Monitor network use for hacking attempts and take preventive action

New cards
58

honeypots

Tempting, bogus targets meant to lure hackers

New cards
59

blacklists

Deny the entry of specific IP addresses and other entities

New cards
60

whitelists

Permit communication only with approved entities or in an approved manner

New cards
61

bad apples

Rogue employees who steal secrets, install malware, or hold a firm hostage

New cards
62

Social Engineering

Con games that trick employees into revealing information or performing other tasks that compromise a firm

New cards
63

Voice-print

Technology that identifies users via unique characteristics in speech

New cards
64

CAPTCHAs

An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.

New cards
65

Push-Button Hacking

Tools to make it easy for criminals to automate attacks

New cards
66

Business Intelligence

A term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis

New cards
67

Analytics

A term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions

New cards
68

Machine Learning

A type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions that predictions on their own without additional programming

New cards
69

Dynamic Pricing

Changing pricing based on demand conditions

New cards
70

Data

raw facts and figures

New cards
71

Information

Data presented in a context so that it can answer a question or support decision-making

New cards
72

Knowledge

Insight derived from experience and expertise (based on data and information)

New cards
73

Database

A single table or a collection of related tables

New cards
74

database management systems (DBMS)

Sometimes referred to as database software; software for creating, maintaining, and manipulating data

New cards
75

Structured query language (SQL)

A language used to create and manipulate databases

New cards
76

Database Administrator (DBA)

Job focused on directing, performing, or overseeing activities associated with a database or set of databases. These may include but not limited to: database design, creation, implementation, maintenance, backup and recovery, policy setting and enforcement, and security

New cards
77

Table or File

A list of data, arranged in columns and rows

New cards
78

column or field

In a database table andrepresent each category of data contained in a record

New cards
79

row or record

In a database table and represent a single instance of whatever the table keeps track of

New cards
80

Relational Databases

The most common standard for expressing databases, whereby tables (files) are related based on common keys

New cards
81

Serverless Computing

A type of cloud computing where a third-party vendor manages servers, replication, fault-tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building “Business Solutions” and eliminating the need to spend time and resources managing the technology complexity of much of the underlying “IT Solution”

New cards
82

Transaction Processing Systems (TPS)

Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return

New cards
83

Transaction

Some kind of business exchange

New cards
84

Loyalty Program / Loyalty Card

Systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity. In addition to enhancing data collection, loyalty cards can represent a significant switching cost

New cards
85

Artificial Intelligence

Computer software that seeks to reproduce or mimic (perhaps with improvements) human thought, decision-making, or brain functions

New cards
86

Data aggregators

Firms that collect and resell data

New cards
87

Legacy Systems

Older information systems that are often incompatible with other systems, technologies, and ways of conducting business. Incompatible legacy systems can be a major roadblock to turning data into information, and they can inhibit firm agility, holding back operational and strategic initiatives

New cards
88

Data warehouse

A set of databases designed to support decision-making in an organization

New cards
89

Data mart

A database or databases focused on addressing the concerns of a specific problem (e.g., increasing customer retention, improving product quality) or business unit (e.g., marketing, engineering)

New cards
90

Online Analytical Processing (OLAP)

A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube

New cards
91

Data Cube

A special database used to store data in OLAP reporting

New cards
92

Data Lake

A catch-all term for storage and access technologies used in Big Data. Are systems that allow for the storage of data in both structured as well as "raw," "unfiltered" formats. Also provide the tools to "pipe out" data, filter it, and refine it so that it can be turned into information

New cards
93

Hadoop

A set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation

New cards
94

data cloud

Sometimes referred to as cloud data warehousing, this term refers to a cloud service that provides tools to extract and transform data from disparate sources so that it can be interrogated as need

New cards
95

ETL (Extract Transform Load)

copying data from multiple, disparately organized data sources, transforming (or cleaning) the data into a common format, and loading it into a combined usable format. Is a key step in getting data into a data warehouse or data mart

New cards
96

Snowflake

Is a cloud-hosted relational database for building data warehouses

New cards
97

e-discovery

The process of identifying and retrieving relevant electronic information to support litigation efforts

New cards
98

Query tools

A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria

New cards
99

Python

A general purpose programming language that is also popular for data analytics

New cards
100

R

A programming language specifically created for analytics, statistical, and graphical computing

New cards

Explore top notes

note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 31 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8203 people
Updated ... ago
4.6 Stars(43)

Explore top flashcards

flashcards Flashcard109 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 117 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard42 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard100 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 32 people
Updated ... ago
5.0 Stars(2)