1/78
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Analytical
Relating to data used for decision-making and business intelligence, derived from processing raw transactional data to identify trends and patterns.
Attribute
The data elements associated with an entity
Backup
An exact copy of the system’s information
Bandwidth
The maximum amount of data that can pass from one point to another in a unit of time.
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices.
Broadband
A high-speed internet connection that is always connected.
Capacity
Represents the maximim throughput a system. can deliver; for example, the capacity of a hard drive represents the size or volume
Client
A computer designed to request information from a server
Cloud (computing)
Stores, manages, and processes data and applications over the Internet rather than on a personal computer or server
Database
Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
Disaster
An unexpected event that severely disrupts business operations, requiring disaster recovery plans to restore IT systems and data.
Divide (digital)
A worldwide gap giving advantage to those with access to technology.
E-R
A modeling technique used in database design to visually represent the relationships between entities (e.g., customers, orders) and their attributes.
Energy (consumption)
The amount of energy consumed by business processes and systems.
Excess
Unused or surplus system resources (e.g., unused server capacity, idle bandwidth, or over-provisioned storage).
Field
A characteristic of a table
Geographic (information system)
Stores, views, and analyzes geographic data, creating multidimensional charts or maps.
Integrate
To combine separate systems, applications, or data sources into a unified framework to enable seamless communication and functionality.
Internet
A massive network that connects computers all over the world and allows them to communicate with one another.
IP
The core communications protocol that routes data packets across networks (including the Internet) by assigning unique addresses (IP addresses) to devices.
Legacy system
An old system that is fast approaching or beyond the end of its useful life with an organization
Managerial
Relating to the use of information systems and data to support decision-making by managers within an organization.
MetaData
Details about data
Modem
A hardware device that converts digital signals (from computers) to analog signals (for telephone/cable lines) and vice versa, enabling internet connectivity.
Primary Key
A field (or a group of fields) that uniquely identifies a given record in a table.
Protocol
Set of rules to communication between nodes
Router
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it toward its destination
Scalability
Describes how well a system can scale up or adapt to the increase demands of growth
Server
A computer dedicated to providing information in response to requests.
Single
non-redundant component whose failure would disrupt operations
Streaming
A method of sending audio and video files over the internet in such a way that the user can view the file while it is being transferred.
Transactional
Relating to the real-time recording of individual business operations (e.g., sales, orders, payments).
Warehouse (data warehouse)
a logical collection of information, gathered from many different operational databses, that supports business analysis activities and decision-making tasks
Wide (WAN)
Short for wide area network.
A network that spans a large geographic area (e.g., between cities/countries), using routers and IP protocols to connect smaller networks like LANs.
LAN
Short for local area network. A network that connects devices within a limited geographic area (e.g., office, school, home) using Ethernet or Wi-Fi.
Antivirus (software)
Scans and searches hard drives to prevent, detect, and remove known viruses, adware and spyware
Artificial (intelligence)
Simulates human thinking and behavior such as the ability to reason and learn.
Asynchronous (communication)
communication such as email in which the message and the response do not occur at the same time.
Authentication
A method for confirming users’ identiies.
Authorization
The process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
Clickstream
The exact path a visitor takes through a website including the pattern of a consumer’s navigation.
Communication (device)
Equipment used to send information and receive it from one location to another.
Cookie
A small file deposited on a hard drive by a website, containing information about customers and their browsing activities.
Decision (support systems; DSSs)
support systems model information using OLAP which provides assistance in evaluating and choosing among different courses of action.
Disruptive (technology)
A new way of doing things that initially does not meet the need of existing customers.
Downtime
Refers to a period of time when a system is unavailable.
Email (privacy policy)
Details the extent to whcih email messages may be read by others.
Encryption
Scrambles information into alternative form that requires a key or password to decrypt.
Ethics
The principles and standards that guide our behavior towards other people.
Expert (system)
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
Firewall
Hardware and/or software that guard a private network by analyzing incoming and outgiong information for the correct markings.
Gigahertz
The number of billions of CPU cycles per second.
Hackers
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge.
Hoaxes
A deliberate deception or false claim, often spread digitally, that tricks people into believing or sharing misinformation, such as fake virus warnings or scams.
Human (error)
A deliberate deception or false claim, often spread digitally, that tricks people into believing or sharing misinformation, such as fake virus warnings or scams.
Information
Data that has been processed, organized, or structured to provide meaning, context, or usefulness (e.g., sales reports, weather forecasts).
Intellectual (property)
intangible creative work that is embodied in physical forms and includes copyrights, trademarks, and patents.
Knowledge
Skills, experience, and expertise coupled with information and intelligence that creates a person’s intellectual resources.
Managerial (decisions)
concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management.
Multitasking
Allows more than one piece of software to be used at a time.
Niche
A specialized segment of a market tailored to specific customer needs, often targeted through focused business strategies (e.g., vegan footwear or luxury pet accessories)
Open (source)
refers to any software whose source code is made available free for any third party to review and modify.
Operational (decisions)
Affect how the firm is run from day to day.
People
The human element of information systems, including users, IT staff, and stakeholders who interact with technology to achieve business goals.
Pirated (software)
Unauthorized copying, distribution, or use of copyrighted software without proper licensing or payment, violating intellectual property laws.
Privacy
The right to control how personal information is collected, used, and shared, protected by laws (e.g., GDPR, CCPA) and organizational policies.
Profitability
A measure of a business’s financial performance, calculated as revenue minus expenses, indicating its ability to generate earnings (e.g., net profit margin).
Property
Random
access memory that is the computer’s primary working memory, in which program instructions and data are stored so that they can be access directly by the CPU via the processor’s high speed external data bus.
Security
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by person’s inside or outside an organization.
Social
Refers to technologies and strategies that enable user interaction, collaboration, and community-building in digital environments (e.g., social media platforms, enterprise social networks).
Software
The set of instructions the hardware executes to carry out specific tasks.
Spam
Unsolicited email.
Spyware
A special class of adware that collects data about the user and transmits it over the internet without the user’s knowledge or permission.
Strategic (decisions)
involves higher-level issues concerned with the overall direction of the organization.
Supply (chain)
consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
Transaction
A recorded business event (e.g., sale, purchase) processed by information systems to update data and support operations
Virus
software written with malciious intent to cause annoyance or damage
Worm
Spreads itself not only from file to file but also from computer to computer.