Looks like no one added any tags here yet for you.
SDLC
A process used by software development teams to design, develop, and test high quality software
System & Planning
Aims to identify, plan, and select development project critical to the organizations mission
System Analysis
Involves specifying the steps & algorithms for transforming data inputs into information
System Implementation & Operation
The systems designed is turned into a working information system through software programming and testing
Software
Refers to a set of instructions or programs that tell a computer how to perform specific tasks
Hardware
Refers to the physical components of a computer system that can touch and see.
Worm
A variation of virus that is target at networks is designed to spread itself without the need for an infected host file to share
Virus
Is a destructive program that disrupts the normal functioning of information systems.
Threat of New Entrance
Examine how easy or difficult it is for new companies to enter an industry
Bargaining Power of suppliers
Looks at how much power suppliers have over firms in industry
Threat of substitutes
Examines the likelihood of customers switching to alternative products of services
Bargaining Power of Buyers
Consider how much power buyers have over firms
Rivalry among existing competitors
Looks at the intensity of competition among firms
Click-Only
refers to businesses that operate solely online and do not have physical brick-and-mortar stores.
Brick & Motor
refers to businesses that have physical retail stores in addition to an online presence.
Hybrid
refers to businesses that combine online and offline sales channels.
Cloud Computing
is the delivery of computing services—including servers, storage, databases, networking, software, and more—over the internet
IaaS
provides virtualized computing resources over the internet. This includes virtual machines, storage, and networking capabilities.
PaaS
provides a platform that allows developers to build, deploy, and manage applications without having to worry about underlying infrastructure.
SaaS
delivers software applications over the internet on a subscription basis.
Firewall
They are an essential component of a comprehensive network security strategy in MIS. They help protect sensitive information, prevent cyber attacks, and ensure the integrity and availability of the company's network resources.
PAN (Personal Area Network)
Wireless communication between devices, using tech- nologies such as Bluetooth; Under 10 meters
LAN (Local Area Network)
Sharing of data, software applications, or other resources between several users; Typically within a building
WAN (Wide Area Network)
Connect multiple LANs, often with distributed ownership and management; Large physical distance, from spanning multiple buildings or the area of a city to worldwide
Order-to-Cash (O2C)
The process that starts with receiving a customer order and ends with receiving payment for the order.
Procure-to-Pay (P2P)
The process that starts with identifying the need for a product or service and ends with making payment to the supplier.
Make-to-Stock (MTS)
products are manufactured based on demand forecasts and stocked in inventory before customer orders are received. This allows for quick order fulfillment.
Make-to-Order (MTO)
products are manufactured only after receiving customer orders. This allows for customization of products but may result in longer lead times.
Storage
refers to the methods and technologies used to store data and information. This includes hard disk drives, solid-state drives, and cloud storage services.
Networking
involves the hardware and software components used to connect computers and devices within an organization.
Data Centers
are facilities that house the hardware and software components of an information system.
Hacker
Originally meant a skilled programmer or technologist, but now often refers to someone who gains unauthorized access to computer systems or networks.
Cracker
Someone who uses their technical skills to gain unauthorized access to computer systems or networks for malicious purposes.
Botnet
are software robots working together with
zombie computers
Computer Crime
Using a computer to commit an illegal act