BADM 2301- Information Systems Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Moore's Law

The observation that, over the history of computing hardware, the number of transistors in a dense integrated circuit doubles approximately every two years.

2
New cards

Primary Storage

High-speed storage located directly on the motherboard that stores data to be processed by the CPU, instructions telling the CPU how to process the data, and operating system programs.

3
New cards

Secondary Storage

Technology that can store very large amounts of data for extended periods.

4
New cards

Porter's Competitive Forces Model

A model that identifies FIVE major forces that can endanger or enhance a company's position in a given industry: Threat of New Entrants, Supplier Power, Threat of Substitute Products or Services, Buyer Power, and Competing Organizations.

5
New cards

Database

A collection of related files or tables containing data.

6
New cards

Network

A connecting system (wireline or wireless) that enables multiple computers to share resources.

7
New cards

Hardware

A device such as a processor, monitor, keyboard, or printer. Together, these devices accept, process, and display data and information.

8
New cards

Software

A program or collection of programs that enable the hardware to process data.

9
New cards

Privacy

The right to be left alone and to be free of unreasonable personal intrusions.

10
New cards

Accountability

A tenet of ethics that refers to determining who is responsible for actions that were taken.

11
New cards

Liability

A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

12
New cards

Responsibility

A tenet of ethics in which you accept the consequences of your decisions and actions.

13
New cards

Cyberterrorism

Can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

14
New cards

Identity Theft

Crime in which someone uses the personal information of others to create a false identity and then uses it fraudulently.

15
New cards

Vulnerability

The possibility that an information resource will be harmed by a threat.

16
New cards

Public Key

The locking key when sending an encrypted message

17
New cards

Private Key

The unlocking key for opening an encrypted message

18
New cards

VPN (Virtual Private Network)

A private network that uses a public network (usually the Internet) to securely connect users by using encryption.

19
New cards

RFID (Radio-Frequency Identification)

A wireless technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

20
New cards

ERP (Enterprise Resource Planning) Systems

Information systems that correct a lack of communication among the functional area Information Systems by tightly integrating the functional area Information Systems via a common database.

21
New cards

TPS (Transaction Processing System)

A system that supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.

22
New cards

DDos (Distributed Denial of Service) Attack

A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.

23
New cards

Data Lake

A central repository that stores all of an organization's data, regardless of their source or format.

24
New cards

Big Data

A collection of data so large and complex that it is difficult to manage using traditional database management systems.

25
New cards

SQL (Structured Query Language)

The most popular query language for requesting information from a relational database.

26
New cards

Web Authoring

A Personal Application Software that allows users to design websites and publish them on the Web. ex. Wordpress, Adobe Workshop

27
New cards

IPv4

An IP addressing scheme with 32 bits, or 4,294,967,295 distinct addresses. Introduced in 1981, with nine numbers.

28
New cards

IPv6

An IP addressing scheme with 128 bits, basically an infinite number of addresses. Introduced in 1998, with 32 numbers and letters.

29
New cards

LAN (Large-Area Network)

A network that connects communications devices in a limited geographic region, such as a building, so that every user device on the network can communicate with every other device.

30
New cards

WAN (Wide-Area Network)

A network, generally provided by common carriers, that covers a wide geographical area.

31
New cards

MAN (Metropolitan-Area Network)

Relatively large networks that cover a metropolitan area.

32
New cards

PAN (Personal-Area Network)

Short-range networks—typically a few meters—that are used for communication among devices close to one person. They can be wired or wireless. ex. telephones, personal digital assistants, smartphones

33
New cards

Order of AN by size (smallest to largest)

PAN, LAN, MAN, WAN

34
New cards

Fiber-optic

A communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information through pulses of light generated by lasers.

35
New cards

Wireless Communication

Communications in which electromagnetic waves, rather than some form of wire or cable, carry the signal between communicating devices such as computers, smartphones, and iPads.

36
New cards

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

37
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol)

A file transfer protocol that can send large files of information across sometimes-unreliable networks with the assurance that the data will arrive uncorrupted.

38
New cards

E-commerce Business Models

The e-commerce method by which a company generates revenue to sustain itself. ex. online direct marketing, electronic tendering system, affiliate marketing, online auctions

39
New cards

Security

The degree of protection against criminal activity, danger, damage, or loss.

40
New cards

Artificial Intelligence (AI)

A subfield of computer science that is concerned with studying the thought processes of humans and re-creating the effects of those processes with machines such as computers.

41
New cards

Machine Learning

The ability to accurately perform new, unseen tasks, built on known properties learned from training or historical data that are labeled.

42
New cards

Communications Act of 1934

The U.S. government provided a universal service guarantee that mandated that every resident have a baseline level of telecommunications services

43
New cards

Network Interface Card (NIC)

A card that allows the device to physically connect to the LAN's communications medium

44
New cards

Sarbanes-Oxley Act (SARBOX!!!!)

Requires (1) Public companies to evaluate and disclose the effectiveness of their internal financial controls and (2) Independent auditors for these companies agree to this disclosure. The law also holds CEOs and CFOs personally responsible for such disclosures.