MIS 180

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/110

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

111 Terms

1
New cards

Business intelligence (BI)

provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

2
New cards

Computer literacy

is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.

3
New cards

Data

consists of raw facts and is a component of an information system.

4
New cards

Database

A database is a collection of all relevant data organized in a series of integrated files.

5
New cards

Five Forces Model

Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. The five forces include buyer power, supplier power, threat of substitute products or services, threat of new entrants, and rivalry among existing competitors.

6
New cards

Information

consists of facts that have been analyzed by the process component and is an output of an information system.

7
New cards

Information literacy

is understanding the role of information in generating and using business intelligence.

8
New cards

Information technologies

support information systems and use the Internet, computer networks, database systems, POS systems, and RFID tags.

9
New cards

Management information system (MIS)

A management information system (MIS) is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

10
New cards

Process

The process component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis.

11
New cards

Strategic information systems (SISs)

focus on big-picture, long-term goals and objectives and assist an organization or a decision maker to achieve them.

12
New cards

Transaction-processing systems (TPSs)

focus on data collection and processing; the major reason for using them is cost reduction.

13
New cards

Artificial intelligence (AI)

consists of related technologies that try to simulate and reproduce human thought and behavior, including thinking, speaking, feeling, and reasoning. AI technologies apply computers to areas that require knowledge, perception, reasoning, understanding, and cognitive abilities.

14
New cards

Artificial neural networks (ANNs)

are networks that learn and are capable of performing tasks that are difficult with conventional computers, such as playing chess, recognizing patterns in faces and objects, and filtering spam e-mail.

15
New cards

Augmented intelligence

The goal of augmented intelligence is to complement decision makers, not replace them.

16
New cards

Backward chaining

In backward chaining, the expert system starts with the goal—the "then" part—and backtracks to find the right solution.

17
New cards

Case-based reasoning (CBR)

is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, the details of which have been stored in a database. After finding a match, the CBR system offers a solution; if no match is found, even after more information is supplied, the human expert must solve the problem.

18
New cards

Contextual computing

refers to a computing environment that is always present, can feel our surroundings, and—based on who we are, where we are, and whom we are with—offer recommendations.

19
New cards

Data-mining agents

work with a data warehouse, detecting trends and discovering new information and relationships among data items that were not readily apparent.

20
New cards

Expert systems

mimic human expertise in a particular field to solve a problem in a well-defined area.

21
New cards

Explanation facility

An explanation facility performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

22
New cards

Forward chaining

In forward chaining, a series of "if-then-else" condition pairs is performed.

23
New cards

Fuzzy logic

allows a smooth, gradual transition between human and computer vocabularies and deals with variations in linguistic terms by using a degree of membership.

24
New cards

Genetic algorithms (GAs)

are search algorithms that mimic the process of natural evolution. They are used to generate solutions to optimization and search problems using such techniques as mutation, selection, crossover, and chromosome.

25
New cards

Inference engine

An inference engine is similar to the model base component of a decision support system. By using different techniques such as forward and backward chaining, it manipulates a series of rules.

26
New cards

Intelligent agents

are software capable of reasoning and following rule-based processes; they are becoming more popular, especially in e-commerce.

27
New cards

Knowledge acquisition facility

A knowledge acquisition facility is a software package with manual or automated methods for acquiring and incorporating new rules and facts, making the expert system capable of growth.

28
New cards

Knowledge base

A knowledge base is similar to a database, but in addition to storing facts and figures, it keeps track of rules and explanations associated with facts.

29
New cards

Knowledge base management system (KBMS)

A knowledge base management system (KBMS), similar to a DBMS, is used to keep the knowledge base updated with changes to facts, figures, and rules.

30
New cards

Machine learning

is a process and procedure by which knowledge is gained through experience. In other words, computers learn without being explicitly programmed.

31
New cards

Monitoring and surveillance agents

usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.

32
New cards

Natural-language processing (NLP)

was developed so users could communicate with computers in human language.

33
New cards

Personal agents

perform specific tasks for a user, such as remembering information for filling out Web forms or completing e-mail addresses after the first few characters are typed.

34
New cards

Robots

are one of the most successful applications of AI. They perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

35
New cards

Shopping and information agents

help users navigate through the vast resources available on the Web and provide better results in finding information. These agents can navigate the Web much faster than humans and gather more consistent, detailed information. They can serve as search engines, site reminders, or personal surfing assistants.

36
New cards

Soft robot

A soft robot is made of elastomer, is simpler to make and less expensive than conventional robots, and is used for an increasing number of applications.

37
New cards

Business networking ethics

advocates that to maintain a business network, not only should the organization provide open and fair access to all authorized users, it should also consider three types of networking: utilitarian, emotional, and virtuous.

38
New cards

Acceptable use policies

An acceptable use policy is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

39
New cards

Accountability

refers to issues involving both a user's and organization's responsibilities and liabilities.

40
New cards

Cheap fakes

sometimes known as the new fake news, are audiovisual manipulations of events created with cheap software that's readily available on the Web and then modified using Photoshop and other tools and distributed through the Web.

41
New cards

Cookies

are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

42
New cards

Cybersquatting

is registering, selling, or using a domain name to profit from someone else's trademark.

43
New cards

Deepfakes

are fake videos or audio recordings that look and sound just like real events.

44
New cards

Digital citizenship

means using information technology safely, ethically, and responsibly.

45
New cards

Digital divide

Information technology and the Internet have created a ________. Computers are still not affordable for many people. The digital divide has implications for education.

46
New cards

Disinformation

is fake information that is knowingly distributed.

47
New cards

Fake news

is a story or hoax created to intentionally misinform or deceive readers.

48
New cards

General Data Protection Regulation (GDPR)

The (GDPR) covers a series of laws that protect European Union (EU) citizens' personal data, including genetic data, health records, racial or ethnic origin, and religious beliefs.

49
New cards

Green computing

involves the design, manufacture, use, and disposal of computers, servers, and other computing devices so that there is minimal impact on the environment.

50
New cards

Intellectual property

is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

51
New cards

Log files

which are generated by Web server software, record a user's actions on a Web site.

52
New cards

Misinformation

is fake information that is distributed to an audience, regardless of intent to mislead.

53
New cards

Nonrepudiation

is a method for binding all parties to a contract.

54
New cards

Social media networking ethics

advocates that social media should be open and provide fair access to all of its users.

55
New cards

Spam

is an unsolicited e-mail sent for advertising purposes.

56
New cards

Virtual organizations

are networks of independent companies, suppliers, customers, and manufacturers connected via information technology so they can share skills and costs and have access to each other's markets.

57
New cards

Access controls

are designed to protect systems from unauthorized access in order to preserve data integrity.

58
New cards

Adware

is a form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser.

59
New cards

Asymmetric encryption

uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient's private key, too. Any people who intercept the message cannot decrypt it because they do not have the private key.

60
New cards

Authentication tokens

improve security by transmitting a security token among connected applications. The user logs in once with approved credentials, and then a unique token is generated and shared with connected applications or Web sites to verify the user's identity for a given period.

61
New cards

Availability

means that computers and networks are operating, and that authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

62
New cards

Backdoors

A backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

63
New cards

Baiting

is similar to phishing attacks. What distinguishes it from phishing is the promise that the baiter gives to the recipient.

64
New cards

Biometric security measures

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

65
New cards

Black hats

Hackers who specialize in unauthorized penetration of information systems. They attack systems for profit, fun, or political motivation or as part of a social cause. These penetration attacks often involve modifying and destroying data.

66
New cards

Blended threats

A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

67
New cards

Brain passwords

A brain password is a digital reading of a user's brain activity while looking at a series of images. These brain activities are recorded in a database. To log in to a system or enter a secure room, the user puts on a special hat and again watches the sequence of images. The new brain activities are compared with the ones in the database and then access is given or denied.

68
New cards

Business continuity planning

outlines procedures for keeping an organization operational after a natural disaster or network attack.

69
New cards

Callback modem

A callback modem verifies whether a user's access is valid by logging the user off (after the user attempts to connect to the network) and then calling the user back at a predetermined number.

70
New cards

Computer fraud

is the unauthorized use of computer data for personal gain.

71
New cards

Confidentiality

means that a system must prevent disclosing information to anyone who is not authorized to access it.

72
New cards

Cryptojacking

occurs when hackers secretly use the computing power of a user to mine cryptocurrency.

73
New cards

Data encryption

transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

74
New cards

Denial-of-service attacks

A denial-of-service (DoS) attack floods a network or server with service requests to prevent legitimate users' access to the system.

75
New cards

DNA identification

gathers a user's unique behavioral characteristics and then creates an "eDNA" profile that is used for identification when the user tries to log in to a system.

76
New cards

Fault-tolerant systems

ensure availability in the event of a system failure by using a combination of hardware and software.

77
New cards

Firewall

A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

78
New cards

Gray hats

As you might imagine, they are a mixture of black and white hacking. Gray hats may violate laws or ethical standards, but they do not have the malicious intent to harm a person or a system. They look for vulnerabilities in a system without the owner's permission or knowledge. They may inform the owner that they have found vulnerabilities and will fix them for a small fee.

79
New cards

Implanted microchips

a controversial technology, are microchips the size of a grain of rice that are inserted between the thumb and the index finger. The microchip can store various information, including that for a user's ID cards and credit cards, which could be used to log in to Web sites and to enter a secure room.

80
New cards

Integrity

refers to the accuracy of information resources within an organization.

81
New cards

Intrusion detection system (IDS)

An intrusion detection system (IDS) can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

82
New cards

Keystroke loggers

are software or hardware devices that monitor and record keystrokes.

83
New cards

Logic bombs

A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program.

84
New cards

Password

A password is a combination of numbers, characters, and symbols that a user enters to gain access to a system.

85
New cards

Pharming

Similar to phishing, pharming directs Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site, then alter its IP address so that users who enter the correct Web address are directed to the pharmer's fraudulent Web site.

86
New cards

Phishing

is the transmission of fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

87
New cards

Physical security measures

primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.

88
New cards

PKI (public key infrastructure)

A PKI (public key infrastructure) enables users of a public network such as the Internet to securely and privately exchange data through the use of a pair of keys—a public one and a private one—that is obtained from a trusted authority and shared through that authority.

89
New cards

Quid pro quo

Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login information for a service or prize.

90
New cards

Rootkits

A rootkit is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected.

91
New cards

Script kiddies

Inexperienced, usually young hackers who use programs that others have developed to attack computer and network systems and deface Web sites.

92
New cards

Secure Sockets Layer (SSL)

is a commonly used encryption protocol that manages transmission security on the Internet.

93
New cards

Sniffing

is capturing and recording network traffic.

94
New cards

Social engineering

takes advantage of the human element of a security system to trick others into revealing private information.

95
New cards

Spoofing

is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

96
New cards

Transport Layer Security (TLS)

is a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet.

97
New cards

Spyware

is software that secretly gathers information about users while they browse the Web.

98
New cards

Symmetric encryption

In symmetric encryption (also called secret key encryption), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.

99
New cards

Trojan programs

A Trojan program contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the program, unaware that the malicious program is also running in the background.

100
New cards

Virtual private network (VPN)

A virtual private network (VPN) provides a secure "tunnel" through the Internet for transmitting messages and data via a private network.