FINAL CSIS150

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Contingent work

A job situation in which a worker does not have an explicit or implicit contract for long-term employment

2
New cards

Gig economy

Refers to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements.

3
New cards

Intellectual property

Describes works of the mind that are distinct and owned or created by a single person or group. (Art, Music, Books)

4
New cards

Copyright

The exclusive right to distribute, display, perform, or reproduce an original work in copies, or to prepare derivative works based on the work.

5
New cards

Copyright infringement

A violation of the rights secured by the owner of a copyright.

6
New cards

Fair use doctrine

Allows portions of copyrighted materials to be used without permission

7
New cards

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008

Increased trademark and copyright enforcement and substantially increased penalties for infringement

8
New cards

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Established minimum levels of protection that each government must provide to the intellectual property of all WTO members

9
New cards

Forms Of Intellectual Property

Copyright, Patent, Trade Secret

10
New cards

Digital Millennium Copyright Act (1998)

Implements the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty

11
New cards

Patent

A grant of a property right issued by the U.S. Patent and Trademark Office (USPTO) to an inventor

12
New cards

Patent infringement

Unauthorized use of another’s patent

13
New cards

Leahy-Smith America Invents Act (2011)

Enacted a major change in patent law; changed U.S. patent system from a “first-to-invent” to a “first-inventor-to-file” system.

14
New cards

Software patent

Protects a feature, function, or process embodied in instructions executed on a computer.

15
New cards

Trade secret

Business information that has the following qualities.

16
New cards

Uniform Trade Secrets Act (UTSA)

Established uniformity across the states in area of trade secret law.

17
New cards

Economic Espionage Act (EEA) of 1996

Imposes penalties for the theft of trade secrets

18
New cards

Defend Trade Secrets Act of 2016

Amended the EEA to create a federal civil remedy for trade secret misappropriation

19
New cards

Nondisclosure clause

Part of an employment contract that specifically prohibits an employee from revealing company secrets

20
New cards

Noncompete agreement

Part of an employment contract that prohibits an employee from working for any competitors for a period of time

21
New cards

Plagiarism

The act of stealing someone’s ideas or words and passing them off as one’s own.

22
New cards

Reverse engineering

The process of taking something apart in order to understand it, build a copy of it, or improve it.

23
New cards

Competitive intelligence

Legally obtained information gathered to help a company gain an advantage over rivals.

24
New cards

Cybersquatter

An individual or company that registers domain names for famous trademarks or company names to which they have no connection.

25
New cards

Trademark

A logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s.

26
New cards

Intellectual property

Describes works of the mind that are distinct and owned or created by a single person or group.

27
New cards

Patent

A grant of property right issued by the USPTO that permits its owner to exclude the public from making, using, or selling a protected invention.

28
New cards

Open source code

Any program whose source code is made available for use or modification, as users or other developers see fit.

29
New cards

High-quality software systems

Easy to learn and use; perform quickly and efficiently, meet users’ needs; and operate safely and reliably, with minimal system downtime.

30
New cards

Software defect

Any error that, if not removed, could cause a software system to fail to meet its users’ needs.

31
New cards

Software quality

The degree to which a software product meets the needs of its users

32
New cards

Quality management

Defining, measuring, and refining the quality of products and the development process

33
New cards

Business information system

A set of interrelated components that collects and processes data and disseminates the output

34
New cards

Decision support system (DSS)

Used to improve decision making

35
New cards

Product liability

The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products.

36
New cards

Strict liability

The defendant is held responsible for injury, regardless of negligence or intent.

37
New cards

Contributory negligence

Plaintiffs’ own actions contributes to their injuries

38
New cards

Warranty

Assures buyers or lessees that a product meets certain standards of quality

39
New cards

Breach of warranty

Buyer or lessee can sue the seller or lessor if the product fails to meet the terms of its warranty.

40
New cards

Software development methodology

Standard, proven work process that enables controlled progress while developing high-quality software.

41
New cards

Waterfall system development model

A sequential, multistage system development process in which development of the next stage cannot begin until the results of the current stage are approved.

42
New cards

Agile development

A methodology under which a system is developed in iterations (often called sprints) lasting from one to four weeks.

43
New cards

Quality assurance (QA)

Methods within the development process designed to guarantee reliable operation of a product.

44
New cards

Dynamic testing

Entering test data and comparing the results with the expected results in a process.

45
New cards

Black-box testing

Views the software unit as a device that has expected input and output behaviors but whose internal workings are unknown

46
New cards

White-box testing

Treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

47
New cards

Static testing

Software-testing technique in which software is tested without actually executing the code

48
New cards

Unit testing

Individual components of code (subroutines, modules, and programs) are tested.

49
New cards

Integration testing

Software units are combined into an integrated subsystem and tested to ensure the linkages among the various subsystems work.

50
New cards

System testing

Various subsystems are combined to test the entire system.

51
New cards

User acceptance testing

Trained end users conduct independent testing

52
New cards

CMMI models

Collections of best practices that help organizations improve processes

53
New cards

Best practice

A method that has consistently shown results superior to those achieved with other means

54
New cards

CMMI-Development (CMMI-DEV)

Frequently used to assess and improve software development processes.

55
New cards

Safety-critical system

A system whose failure may cause injury or death

56
New cards

System safety engineer

Has responsibility for system’s safety; uses a logging and monitoring system to track hazards from a project’s start to its finish.

57
New cards

Reliability

A measure of the rate of failure in a system that would render it unusable over its expected lifetime.

58
New cards

Annualized rate of occurrence (ARO):

An estimate of the probability that this event will occur over the course of a year.

59
New cards

Single loss expectancy (SLE)

The estimated loss that would be incurred if the event happens.

60
New cards

Annualized loss expectancy

The estimated loss from this risk over the course of a year.

61
New cards

Risk management

The process of identifying, monitoring, and limiting risks to a level that an organization is willing to accept; the level of risk that remains after managing risk is called residual risk.

62
New cards

ISO 9001 family of standards

A set of standards that serves as a guide to quality products, services, and management; updated every five years.

63
New cards

Failure mode and effects analysis (FMEA)

A technique used to develop ISO 9001-compliant quality systems • Evaluates reliability and determines the effects of system and equipment failures.

64
New cards

Failure mode

Describes how a product or process could fail to perform the functions described by the customer.

65
New cards

Labor productivity

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services.

66
New cards

Artificial intelligence

An interdisciplinary field in which experts ponder philosophical issues such as the nature of the human mind and the ethics of creating objects gifted with human-like intelligence.

67
New cards

Artificial intelligence systems

The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning, reasoning, and self-correction

68
New cards

Machine learning

A type of artificial intelligence (AI) involving computer programs that can learn and improve their performance with experience.

69
New cards

Robotics

A branch of engineering involving the development and manufacture of mechanical or computer devises that perform tasks that require a high degree of precision or are tedious/hazardous for humans.

70
New cards

Natural language processing

An aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate “natural” languages, such as English.

71
New cards

Electronic medical record (EMR)

A collection of health related information on an individual that is created and consulted by staff within a single healthcare organization

72
New cards

Electronic health record (EHR)

A comprehensive view of a patient’s complete medical history designed to be shared with providers from more than one organization

73
New cards

Personal health record (PHR)

Those portions of the EHR routinely shared with the patient, such as contact information, health provider information, medication history, and test results.

74
New cards

Health information exchange (HIE)

The process of sharing patient-level electronic health information between different organizations

75
New cards

Clinical decision support (CDS)

A process and set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information.

76
New cards

Telehealth

Employs electronic information processing and telecommunications

77
New cards

Telemedicine

Involves providing medical care to people at a location different from the healthcare providers.

78
New cards

Store-and-forward telemedicine

Involves acquiring data, images, and video from a patient and transmitting everything to a medical specialist for later evaluation.

79
New cards

Live telemedicine

Requires the presence of patients and healthcare providers at different sites at the same time; often involves a video conference link between two sites.

80
New cards

Remote monitoring (home monitoring)

Involves ongoing measurement of an individual’s vital signs, and the transmission of this data to a healthcare provider.

81
New cards

Social media

Web-based communication tools that enable people to interact in online communities where they can share ideas, messages, images, audio, and video.

82
New cards

Social networking platform

Creates an online community of Internet users that breaks down barriers created by time, distance, and cultural differences.

83
New cards

Social network marketing

The use of social networks to communicate and promote the benefits of products and services.

84
New cards

Cost per thousand impressions (CPM)

Billed at a flat rate per 1,000 impressions (a measure of the number of times an ad is displayed)—whether or not it was clicked

85
New cards

Cost per click

Billed on a per click basis; no charge when an ad is displayed but not clicked on

86
New cards

Earned media

Refers to the media exposure an organization gets through press and social media mentions, positive online ratings and reviews, tweets and retweets, and reposts (or “shares”).

87
New cards

Social shopping platforms

Combine two highly popular online activities—shopping and social networking.

88
New cards

Cyberabuse

Any form of mistreatment, both physical and mental, based on the use of an electronic communications device, that causes harm and distress to others

89
New cards

Cyberbullying

A form of cyberabuse in which the abusive behavior is humiliating, hurtful, intimidating, malicious, or otherwise offensive to an individual or group of individual and causes substantial emotional distress.

90
New cards

Cyberstalking

A form of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior that is directed by one person against another and that causes fear and distress in the victim

91
New cards

Independent contractor

An individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement.

92
New cards

H-1B visa

A temporary work visa granted by the U.S. Citizenship and Immigration Services (USCIS) for people who work in specialty occupations.

93
New cards

Outsourcing

A long-term business arrangement in which a company contracts for services with an outside organization with expertise in a specific function.

94
New cards

Offshore outsourcing

A form of outsourcing in which services are provided by an organization whose employees are in a foreign country.

95
New cards

Whistle-blowing

An effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an organization.

96
New cards

False Claims Act

Established during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army.

97
New cards

Qui tam provision

Allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors.

98
New cards

Green computing

Concerned with the efficient and environmentally responsible manufacture, operation, and disposal of IT-related products, including laptops, smartphones.