MIS301 Exam 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/203

flashcard set

Earn XP

Description and Tags

burke kills us

Business

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

204 Terms

1
New cards
computing hardware
physical components of tech
2
New cards
software
computer program or collection of programs; precise set of instructions that tells hardware what to do
3
New cards
operating system
software that controls computer hardware and establishes standards for developing and executing apps
4
New cards
application software
performs the work that users and firms are directly interested in accomplishing
5
New cards
applications
includes desktop apps, enterprise software, utilities, and other programs that perform specific tasks for users and orgs
6
New cards
user interface (UI)
mechanism through which users interact with computing devices
7
New cards
firmware
software stored on nonvolatile memory chips
8
New cards
embedded systems
special-purpose software designed and included inside physical products (often firmware)
9
New cards
desktop software
apps installed on personal computer, typically supporting tasks performed by single user
10
New cards
enterprise software
apps that address needs of multiple users throughout an org or work group
11
New cards
database management system (DBMS)
database software, software for creating, maintaining and manipulating data
12
New cards
software package
software product offered commercially by 3rd party
13
New cards
enterprise resource planning (ERP)
software package that integrates many functions of a business
14
New cards
customer relationship management (CRM)
system used to support customer- related sales and marketing activites
15
New cards
supply chain management (SCM)
systems that help a firm manage aspects of its value chain
16
New cards
business intelligence (BI) systems
systems that use data created by other systems to provide reporting and analysis for organizational decision making
17
New cards
distributed computing
form of computing where systems in diff locations communicate and collaborate to complete a task
18
New cards
server
program that fulfills the requests of a client
19
New cards
client
software program that makes requests of a server program
20
New cards
application server
software that houses and serves business logic for use and reuse by multiple apps
21
New cards
web services
small pieces of code that are accessed from the application server, and permit intraoperative machine-to-machine interaction over a network
22
New cards
service-oriented architecture (SOA)
robust set of Web services built around an org's processes and procedures
23
New cards
Application Programming Interface (API)
programming hooks/ guidelines, published by firms that tell other programs how to get a service to perform a task such as send/ receive data
24
New cards
electronic data interchange (EDI)
set of standards for exchanging messages containing formatted data btwn computer apps
25
New cards
extensive markup language (XML)
tagging lang that can be used to identify data fields made available for use by other apps
26
New cards
javascript object notation (JSON)
popular data interchange format; tech standard often used to format data when being sent/ received via APIs
27
New cards
programming language
provides standards, syntax, statements, and instructions for writing computer software
28
New cards
integrated development environment (IDE)
app that includes an editor, debugger, and compiler, among other tools
29
New cards
scripting language
programming tool that executes w/in an app; interpreted w/in their apps rather than compiled to run directly by microprocessor
30
New cards
software development methodologies
methods to divide tasks related to software creation and deployment up into tasks targeted at building better products w stronger PM guidelines and techniques
31
New cards
waterfall method
relatively linear sequential approach to software development
32
New cards
feature creep
expansion of the scope of project
33
New cards
agile development
developing work continually and iteratively; goal of more frequent product rollouts and constant improvement across smaller components of larger project
34
New cards
scrum
approach to organizing and managing agile project that breaks deliverables into "sprints" delivered in 1-6 week increments by teams of
35
New cards
total cost of ownership (TCO)
all costs associated w design, development, testing, implementation, documentation, training, and maintenance of software system
36
New cards
capability maturity model integration (CMMI)
process-improvement approach that can assist in assessing the maturity, quality, and development of certain organizational business processes. and suggest steps for their improvement
37
New cards
marginal cost
cost associated with each additional unit produced
38
New cards
open source software (OSS)
software that is free and where anyone can look at and potentially modify the code
39
New cards
cloud computing
replacing computing resources- either an org's or individual's hardware or software- with services provided over the internet
40
New cards
Software as a service (SaaS)
form of cloud computing where a firm subscribes to a 3rd party software and receives a service that is delivered online
41
New cards
virtualization
type of software that allows a single computer to function as if it were several diff computers, each running its own operating system and software
42
New cards
containers
type of virtualization that allows for shared operating systems for more resources saving and faster execution
43
New cards
virtual desktops
running an instance of a PC's software on another machine and delivering the image of what is executing to the remote device
44
New cards
vertical niches
vertical markets; products and services designed to target a specific industry
45
New cards
service level agreement (SLA)
negotiated agreement btwn customer and vendor
46
New cards
security-focused
"hardened"; tech products that contain particularly strong security features
47
New cards
scalability
ability to handle increasing workloads or easily expandable to manage workload increases
48
New cards
utility computing
firms develops its own software and then runs it over the Internet on a service provider's computers
49
New cards
platform as a service (PaaS)
delivers tools so an org can develop, test, and deploy software in a cloud
50
New cards
infrastructure as a service (IaaS)
offers a more bare-bones set of services that are an alternative to buying its own physical hardware
51
New cards
cloudbursting
use of cloud computing to provide excess capacity during periods of spiking demand
52
New cards
black swans
unpredicted, but highly impactful events
53
New cards
server farm
massive network of computer servers running software to coordinate their collective use
54
New cards
LAMP stack
acronym for Linux, Apache, MySQL, PHP
55
New cards
Linux
OSS operating system
56
New cards
data harvesters
cybercriminals who infiltrate systems and collect data for illegal resale
57
New cards
cash-out fraudsters
criminals who purchase assets from data harvesters to be used for illegal financial gain
58
New cards
botnets
hordes of surreptitiously infiltrated computers, linked and controlled remotely; zombie networks
59
New cards
distributed denial of service (DDoS)
attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests; often performed via botnets
60
New cards
social engineering
con games that trick employees into revealing info or performing other tasks that compromise a firm
61
New cards
hacktivists
protester seeking to make a political point by leveraging tech tools, often through system infiltration, defacement, or damage
62
New cards
hacker
someone who breaks into computer systems or a particularly clever programmer
63
New cards
white hat hackers
someone who uncovers computer weaknesses without exploiting them
64
New cards
black hat hackers
computer criminals
65
New cards
malware signatures
sort of electronic fingerprint used to recognize malicious code
66
New cards
phishing
con executed using tech, typically targeted at acquiring sensitive info or tricking someone into installing malicious software
67
New cards
spoofed
term in security to refer to forging or disguising origin or identity
68
New cards
tokenization
security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment
69
New cards
worms
destructive programs that replicate themselves without requiring another program to provide a safe environment for replication
70
New cards
SQL injection technique
example of an exploit where hackers target security vulnerabilities caused by software developers not validating user input
71
New cards
zero-day exploits
attacks that are so new that they haven't been clearly identified, and so they haven't made it into security screening systems
72
New cards
biometrics
tech that measure and analyze human body characteristics for id or authentication
73
New cards
multi factor authentication
when identity is proven by presenting more than 1 item for proof of credentials
74
New cards
voice print
tech that identifies users via unique characteristics in speech
75
New cards
push button hacking
tools designed to easily automate attacks
76
New cards
dumpster diving
combing through trash to identify valuable assets
77
New cards
shoulder surfing
gaining compromising info through observation
78
New cards
intrusion detection system
system that monitors network use for potential hacking attempts
79
New cards
encryption
scrambling data using a code, thereby hiding it from those who don't have the unlocking key
80
New cards
key
code that unlocks encryption
81
New cards
brute force attacks
exhausts all possible password combos to break into an account
82
New cards
public key encryption
two key system used to securing electronic transmissions
83
New cards
certificate authority
trusted third party that provides authentication services in public key encryption schemes
84
New cards
honeypots
seemingly tempting but bogus target meant to draw hacking attempts
85
New cards
whitelists
highly restrictive programs that permit communication only with approved entities and/or in an approved manner
86
New cards
blacklists
programs that deny entry or exit or specific IP addresses, products, Internet domains, and other communication restrictions
87
New cards
firewalls
system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use
88
New cards
big data
term used to describe the massive amt of data available to today's managers
89
New cards
business intelligence (BI)
term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis
90
New cards
analytics
extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions
91
New cards
machine learning
type of AI that leverages massive amts of data so computers can improve accuracy of actions and predictions on their own w/out additional programming
92
New cards
dynamic pricing
changing pricing based on demand conditions
93
New cards
data
raw facts and figures
94
New cards
information
data presented in a context so that it can answer a question or support decision making
95
New cards
knowledge
insight derived from experience and expertise (based on data and info)
96
New cards
database
single table or collection of related tables
97
New cards
table/file
list of data, arranged in columns (fields) and rows (records)
98
New cards
column/field
column in a table; represent each new category of data contained in a record
99
New cards
row/record
row in table; represent a single instance of whatever the table keeps track of
100
New cards
key (DBMS)
field or fields used to relate tables in a database