Chapter 5 & 6 MIS Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Ethics

The principles and standards that guide our behavior toward other people.

2
New cards

Confidentiality

Assurance that messages and information remain available only to those authorized to view them

3
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself or without the aid of computer technologies

4
New cards

Privacy

The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

5
New cards

Copyright

The legal protection afforded an expression of an idea such as a song, book, or video game

6
New cards

Counterfeit Software

Software that is manufactured to look like the real thing and sold as such

7
New cards

Digital Rights Management

A technical solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying or distribution

8
New cards

Intellectual Property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

9
New cards

Patent

An exclusive right to make, use, and sell an invention and is granted by a govt to an inventor

10
New cards

Pirated Software

The unauthorized use, duplication, distribution, or sale of copyrighted software

11
New cards

Data Scrapping

(Web Scrapping) The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer.

12
New cards

Digital Trust

The measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individual

13
New cards

Ediscovery

Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

14
New cards

Child Online Protection Act

Passed to protect minors from accessing inappropriate material on the Internet.

15
New cards

Downtime

Refers to a period of time when a system is unavailable.

16
New cards

Cybersecurity

Malicious attempts to access or damage a computer system. Cyberattacks have the following attributes

17
New cards

Information Security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

18
New cards

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge

19
New cards

Drive By Hacking

A computer attack by which an attacker accesses a wireless computer network or sends attack instructions without entering the office

or organization that owns the network

20
New cards

Ethical Hacker

A person who hacks into a computer system to find vulnerabilities to help a company test its security.

21
New cards

Bug Bounty Program

A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.

22
New cards

Virus

Software written with malicious intent to cause annoyance or damage

23
New cards

Malware

Software that is intended to damage or disable computers and computer systems

24
New cards

Botnets

causes a collection of connected devices to be controlled by a hacker

25
New cards

Worm

Spreads itself not only from file to file but also from computer to computer

26
New cards

Adware

Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

27
New cards

Spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

28
New cards

Ransomeware

A form of malicious software that infects your computer and asks for money.

29
New cards

Scareware

A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.

30
New cards

Data Granularity

Refers to the extent of detail within the data

31
New cards

Transactional Data

Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks

32
New cards

Analytical Data

Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks.

33
New cards

Real time data

immediate, up-to-date data.

34
New cards

Real time systems

Provide real-time information in response to requests

35
New cards

Data Inconsistency

Occurs when the same data element has different values

ex. customer changes last name due to marriage so now the system has the 2 customers when there is only one

36
New cards

Data Integrity

A measure of the quality of data

can cause managers to consider the system reports invalid and make decisions based on other sources

37
New cards

Five Characteristics to High Quality Data

accuracy, completeness, consistency, timeliness, and uniqueness

38
New cards

Data gap analysis

Occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where data might be missing

39
New cards

Data Steward

Responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business

40
New cards

Data Governance

Refers to the overall management and security of company data

has a defined a policy that specifies who is accountable for various portions or aspects of the data

41
New cards

Master Data Management

gathering data and ensuring it has characteristics of high quality data including entities as customers, suppliers, products, etc.

42
New cards

Data Validation

tests and evaluations used to determine compliance with data governance polices to ensure correctness of data

ensure that every data value is correct and accurate

can control what data values go into a cell in excel like limitation of age for something

43
New cards

Database

Maintains data about various types of inventory, transactions, employees, and warehouses

44
New cards

Database management system

Creates, reads, updates, and deletes data in a database while controlling access and security.

45
New cards

Structured Query Language

Asks users to write lines of code to answer questions against a database.

46
New cards

Query by example

Helps users graphically design the answer to a question against a database

47
New cards

Relational Database

Stores data in the form of logically related, two-dimensional tables

48
New cards

Entity

Stores data about a person, place, thing, transaction, or event.

49
New cards

Attributes

The data elements associated with an entity

Ex. Entity would be Tracks the attribute would be track title or track length

50
New cards

Record

A collection of related data elements.

Each record in an entity occupies one row in its respective table.

51
New cards

Primary Key

A field (or group of fields) that uniquely identifies a given record in a table. Usually involved ID

52
New cards

Foreign Key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

53
New cards

Physical View of data

Deals with the physical storage of data on a storage device.

54
New cards

Logical View of Data

Focuses on how individual users logically access data to meet their own particular business needs.

55
New cards

Data Latency

The time it takes for data to be stored or retrieved.

56
New cards

Data Redundancy

The duplication of data, or the storage of the same data in multiple places.

57
New cards

Business Rule

Defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer

58
New cards

Data Integrity

A measure of the quality of data

59
New cards

Integrity Constriants

Rules that help ensure the quality of data.

60
New cards

Identity Management

A broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

61
New cards

5 advantages of a relational database

-Increased flexibility

-Increased Data Integrity

-Increased scalability and performance

-Increased data security

-Reduced data redundance

62
New cards

4 primary traits of the value of data

-Data Type (transactional/analytical)

-Data Timeliness (real time)

-Data Quality (5 qualities)

-Data governance