Exam 1 Flashcards Set

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards
Information System
Interrelated components working together to collect, process, store, and disseminate information.
2
New cards
Feedback Mechanism
A component of information systems that monitors and controls operations.
3
New cards
Competitive Advantage
The ability to generate more sales and achieve superior profit margins.
4
New cards
Leavitt's Diamond Model
A framework used to introduce new systems into the workplace, focusing on people, technology, processes, and structure.
5
New cards
Personal Information System
An information system that improves the productivity of individual users for stand-alone tasks.
6
New cards
Workgroup Information System
An information system that enables effective collaboration among team members.
7
New cards
Enterprise Information System
An information system that addresses organization-wide business needs.
8
New cards
Interorganizational IS
An information system that enables sharing of information across organizational boundaries.
9
New cards
Strategic Planning
A managerial process to identify initiatives and projects for organizational objectives.
10
New cards
CIO (Chief Information Officer)
The executive responsible for achieving the organization's goals using IS department's resources.
11
New cards
Software Developer
A professional who creates and maintains applications and operating systems.
12
New cards
IS Security Analyst
An individual who plans and implements security measures for systems and data.
13
New cards
Systems Analyst
A professional who defines requirements for new information systems.
14
New cards
Programmer
A person who translates program designs into working software.
15
New cards
Web Developer
An individual who designs and manages websites.
16
New cards
Business Analyst
A professional who evaluates and solves business challenges.
17
New cards
CPU
The central processing unit, the primary component of a computer that performs calculations.
18
New cards
RAM (Random Access Memory)
Temporary volatile storage that stores data and machine code currently being used.
19
New cards
Cache Memory
High-speed memory that processors can access more rapidly than main memory.
20
New cards
ROM (Read-Only Memory)
Nonvolatile memory that permanently stores data and instructions.
21
New cards
Special-purpose Computer
A computer designed to perform a specific set of tasks.
22
New cards
General-purpose Computer
A computer that can perform a variety of tasks and run multiple applications.
23
New cards
Supercomputer
A powerful computer designed for extensive computational capabilities.
24
New cards
Operating System (OS)
Programs that control a computer’s hardware and manage tasks.
25
New cards
Kernel
The core component of an operating system that regulates system operations.
26
New cards
Proprietary Software
Software that is tailored for specific organizations and is not free to use or share.
27
New cards
Software as a Service (SaaS)
A software delivery model where applications are hosted by a service provider and accessed via the Internet.
28
New cards
Open-Source Software
Software that is typically free and allows modifications by anyone.
29
New cards
Network Topology
The arrangement of different elements (links, nodes, etc.) in a computer network.
30
New cards
Star Network
A network topology where all devices are connected to a central hub.
31
New cards
Wi-Fi
A wireless networking technology that allows devices to connect to the Internet.
32
New cards
IP Address
A unique identifier assigned to devices connected to a network.
33
New cards
MAC Address
A hardware identification number that uniquely identifies each device on a network.
34
New cards
Client/Server Model
A network architecture where many clients request services from centralized servers.
35
New cards
Phishing
A cyberattack vector involving fraudulent email schemes to trick individuals into revealing sensitive information.
36
New cards
Trojan Horse
Malicious software disguised as legitimate software.
37
New cards
CIA Security Triad
Three core principles of cybersecurity: Confidentiality, Integrity, and Availability.
38
New cards
Risk Assessment
The process of identifying and prioritizing threats to an organization.
39
New cards
Authentication Methods
Techniques used to verify the identity of a user trying to access a system.
40
New cards
Encryption
The process of converting information or data into a code to prevent unauthorized access.
41
New cards
Network Types
Different classifications of networks, including PAN, LAN, MAN, and WAN.
42
New cards
Twisted-Pair Wire
A type of cable used for telecommunications and networking, consisting of pairs of wires twisted together.
43
New cards
Fiber-Optic Cable
A medium for transmitting data as pulses of light through strands of glass or plastic.
44
New cards
Bluetooth
A short-range wireless technology standard for exchanging data between devices.
45
New cards
Worm
A self-replicating malicious program that spreads across networks.
46
New cards
Cache Memory
A small-sized type of volatile computer memory that provides high-speed data access to the processor.