MSIS CUMULATIVE FINAL

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

Analytical

Relating to data used for decision-making and business intelligence, derived from processing raw transactional data to identify trends and patterns.

2
New cards

Attribute

The data elements associated with an entity

3
New cards

Backup

An exact copy of the system’s information

4
New cards

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time.

5
New cards

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices.

6
New cards

Broadband

A high-speed internet connection that is always connected.

7
New cards

Capacity

Represents the maximim throughput a system. can deliver; for example, the capacity of a hard drive represents the size or volume

8
New cards

Client

A computer designed to request information from a server

9
New cards

Cloud (computing)

Stores, manages, and processes data and applications over the Internet rather than on a personal computer or server

10
New cards

Database

Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

11
New cards

Disaster

An unexpected event that severely disrupts business operations, requiring disaster recovery plans to restore IT systems and data.

12
New cards

Divide (digital)

A worldwide gap giving advantage to those with access to technology.

13
New cards

E-R

A modeling technique used in database design to visually represent the relationships between entities (e.g., customers, orders) and their attributes.

14
New cards

Energy (consumption)

The amount of energy consumed by business processes and systems.

15
New cards

Excess

Unused or surplus system resources (e.g., unused server capacity, idle bandwidth, or over-provisioned storage).

16
New cards

Field

A characteristic of a table

17
New cards

Geographic (information system)

Stores, views, and analyzes geographic data, creating multidimensional charts or maps.

18
New cards

Integrate

To combine separate systems, applications, or data sources into a unified framework to enable seamless communication and functionality.

19
New cards

Internet

A massive network that connects computers all over the world and allows them to communicate with one another.

20
New cards

IP

The core communications protocol that routes data packets across networks (including the Internet) by assigning unique addresses (IP addresses) to devices.

21
New cards

Legacy system

An old system that is fast approaching or beyond the end of its useful life with an organization

22
New cards

Managerial

Relating to the use of information systems and data to support decision-making by managers within an organization.

23
New cards

MetaData

Details about data

24
New cards

Modem

A hardware device that converts digital signals (from computers) to analog signals (for telephone/cable lines) and vice versa, enabling internet connectivity.

25
New cards

Primary Key

A field (or a group of fields) that uniquely identifies a given record in a table.

26
New cards

Protocol

Set of rules to communication between nodes

27
New cards

Router

An intelligent connecting device that examines each packet of data it receives and then decides which way to send it toward its destination

28
New cards

Scalability

Describes how well a system can scale up or adapt to the increase demands of growth

29
New cards

Server

A computer dedicated to providing information in response to requests.

30
New cards

Single

non-redundant component whose failure would disrupt operations

31
New cards

Streaming

A method of sending audio and video files over the internet in such a way that the user can view the file while it is being transferred.

32
New cards

Transactional

Relating to the real-time recording of individual business operations (e.g., sales, orders, payments).

33
New cards

Warehouse (data warehouse)

a logical collection of information, gathered from many different operational databses, that supports business analysis activities and decision-making tasks

34
New cards

Wide (WAN)

Short for wide area network.
A network that spans a large geographic area (e.g., between cities/countries), using routers and IP protocols to connect smaller networks like LANs.

35
New cards

LAN

Short for local area network. A network that connects devices within a limited geographic area (e.g., office, school, home) using Ethernet or Wi-Fi.

36
New cards

Antivirus (software)

Scans and searches hard drives to prevent, detect, and remove known viruses, adware and spyware

37
New cards

Artificial (intelligence)

Simulates human thinking and behavior such as the ability to reason and learn.

38
New cards

Asynchronous (communication)

communication such as email in which the message and the response do not occur at the same time.

39
New cards

Authentication

A method for confirming users’ identiies.

40
New cards

Authorization

The process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

41
New cards

Clickstream

The exact path a visitor takes through a website including the pattern of a consumer’s navigation.

42
New cards

Communication (device)

Equipment used to send information and receive it from one location to another.

43
New cards

Cookie

A small file deposited on a hard drive by a website, containing information about customers and their browsing activities.

44
New cards

Decision (support systems; DSSs)

support systems model information using OLAP which provides assistance in evaluating and choosing among different courses of action.

45
New cards

Disruptive (technology)

A new way of doing things that initially does not meet the need of existing customers.

46
New cards

Downtime

Refers to a period of time when a system is unavailable.

47
New cards

Email (privacy policy)

Details the extent to whcih email messages may be read by others.

48
New cards

Encryption

Scrambles information into alternative form that requires a key or password to decrypt.

49
New cards

Ethics

The principles and standards that guide our behavior towards other people.

50
New cards

Expert (system)

Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

51
New cards

Firewall

Hardware and/or software that guard a private network by analyzing incoming and outgiong information for the correct markings.

52
New cards

Gigahertz

The number of billions of CPU cycles per second.

53
New cards

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge.

54
New cards

Hoaxes

A deliberate deception or false claim, often spread digitally, that tricks people into believing or sharing misinformation, such as fake virus warnings or scams.

55
New cards

Human (error)

A deliberate deception or false claim, often spread digitally, that tricks people into believing or sharing misinformation, such as fake virus warnings or scams.

56
New cards

Information

Data that has been processed, organized, or structured to provide meaning, context, or usefulness (e.g., sales reports, weather forecasts).

57
New cards

Intellectual (property)

intangible creative work that is embodied in physical forms and includes copyrights, trademarks, and patents.

58
New cards

Knowledge

Skills, experience, and expertise coupled with information and intelligence that creates a person’s intellectual resources.

59
New cards

Managerial (decisions)

concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management.

60
New cards

Multitasking

Allows more than one piece of software to be used at a time.

61
New cards

Niche

A specialized segment of a market tailored to specific customer needs, often targeted through focused business strategies (e.g., vegan footwear or luxury pet accessories)

62
New cards

Open (source)

refers to any software whose source code is made available free for any third party to review and modify.

63
New cards

Operational (decisions)

Affect how the firm is run from day to day.

64
New cards

People

The human element of information systems, including users, IT staff, and stakeholders who interact with technology to achieve business goals.

65
New cards

Pirated (software)

Unauthorized copying, distribution, or use of copyrighted software without proper licensing or payment, violating intellectual property laws.

66
New cards

Privacy

The right to control how personal information is collected, used, and shared, protected by laws (e.g., GDPR, CCPA) and organizational policies.

67
New cards

Profitability

A measure of a business’s financial performance, calculated as revenue minus expenses, indicating its ability to generate earnings (e.g., net profit margin).

68
New cards

Property

69
New cards

Random

access memory that is the computer’s primary working memory, in which program instructions and data are stored so that they can be access directly by the CPU via the processor’s high speed external data bus.

70
New cards

Security

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by person’s inside or outside an organization.

71
New cards

Social

Refers to technologies and strategies that enable user interaction, collaboration, and community-building in digital environments (e.g., social media platforms, enterprise social networks).

72
New cards

Software

The set of instructions the hardware executes to carry out specific tasks.

73
New cards

Spam

Unsolicited email.

74
New cards

Spyware

A special class of adware that collects data about the user and transmits it over the internet without the user’s knowledge or permission.

75
New cards

Strategic (decisions)

involves higher-level issues concerned with the overall direction of the organization.

76
New cards

Supply (chain)

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

77
New cards

Transaction

A recorded business event (e.g., sale, purchase) processed by information systems to update data and support operations

78
New cards

Virus

software written with malciious intent to cause annoyance or damage

79
New cards

Worm

Spreads itself not only from file to file but also from computer to computer.