Upgrade to remove ads
ISOM 210 Exam 2
Terms in this set (65)
Software that claims to serve some function but also allows internet advertisers to display advertisements without the consent of the computer user.
Encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semi structured decisions.
The data elements associated with an entity.
A method for confirming users' identities.
The process of providing a user with permission to various levels and abilities in a system.
Backup and Recovery Plans
An exact copy of a system's information.
A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
The identification of a user based on physical characteristics, such as a fingerprint, face, voice, or handwriting.
Business Continuity Planning (BCP)
Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationships for strategic decision making.
Defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer.
Determines future environmental infrastructure requirements to ensure high-quality system performance.
The abuse of pay per click revenue models by repeatedly clicking a link to increase charges or costs for the advertiser.
A computer designed to request information from a server.
Stores, manages, and processes data and applications over the internet rather than on a personal computer or server.
The legal protection afforded an expression of an idea, such as a song, book, or video game.
Raw facts that describe the characteristic of an event or object.
The overall completeness, accuracy and consistency of data.
The overall management of the availability, usability, integrity, and security of the data employed in an enterprise
The process of analyzing data to extract information not offered by the raw data alone.
Logical data structures that detail the relationships among data elements using graphics or pictures.
A logical collection of information, gathered from many operational databases, that supports business analysis activities and decision-making tasks.
Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
Database Management System
Creates, reads, updates, and deletes data in a database while controlling access and security.
The process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.
The ability and speed to which a company can face an issue that occurs on their network.
A data file that identifies individuals or organizations online and is comparable to a digital signature.
Stores information about a person, place, thing, transaction, or event.
Entity Relationship Diagram
A technique for documenting the entities and relationships in a database environment.
Principles or standards that guide our behavior toward other people.
The idea that a system has the ability to respond to unexpected failures or crashes in the system.
A form of fault tolerance, in which when a system goes down, the users are directed to a secondary or backup server.
Hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings.
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Four Quadrants of Ethical and Legal Behavior
Quadrant I: Legal and Ethical, Quadrant II: Illegal and Ethical, Quadrant III: Legal but unethical, Quadrant IV: Illegal and Unethical
A collection of computer, often geographically dispersed, that are coordinated to solve a common problem.
Consists of physical devices associated with a computer system.
Occurs when a system is continuously operational at all times.
Data converted into a meaningful and useful context.
The duplication of data, or the storage of the same data in multiple places.
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
A communication system created by linking two or more devices and establishing a standard methodology in which they can communicate.
Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets.
Computer chips improve to twice its previous ability every 18 months.
A technique used to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate sources.
The unauthorized use, duplication, distribution, or sale of copyrighted software.
Changes that a server makes in order to reduce chances of future issues.
A field (or group of fields) that uniquely identifies a given record in a table.
Right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Public Key Encryption (PKE)
Uses two keys: a public key that everyone can have and a private key for only the recipient.
Real Time Information
Immediate up to date information.
A collection of related data elements.
Stores information in the form of logically related two-dimensional tables.
A computer dedicated to providing information in response to requests.
The set of instructions the hardware executes to carry out specific tasks.
An unsolicited email.
A special adware that collects data about the user and transmits it over the internet without the user's knowledge or permission.
Structured Query Language
Users write lines of code to answer questions against a database.
Sustainable MIS Infrastructure
Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
Composed of rows and columns that represent an entity.
All information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operation or structured decisions.
Two Factor Authentication
Requires the user to provide two means of authentication: what the user knows (password) and what the user has (security key)
Track's employee's activities such as number of keystrokes, error rate, 0 and number of transactions processed.
Malware computer program that spreads itself not only from file to file but also from computer to computer.
Software written with malicious intent to cause annoyance or damage.
YOU MIGHT ALSO LIKE...
ISOM 210 Test 2 Ball State University
MINS 301 Midterm 2 Study Guide
Chapters 1-3 IT
OTHER SETS BY THIS CREATOR
Audit Test 1 - Evidence and Assertions
Management Exam 1 (CH 1,2,11,12)
OTHER QUIZLET SETS
issues and perspectives- exam review
Reception & Customer Service
Clinical Orthopedics: Cervical Spine Lec…
Bio 1, lecture 7, cell part 2