This site is 100% ad supported. Please add an exception to adblock for this site.

k201 midterm1

Terms

undefined, object
copy deck
________information systems is the function that plans for, develops, implements and maintains IT hardware, software, and applications that people use to support the goals of an organization
Management
______are raw facts that describe the characteristics of an event
Data
_______is data converted into a meaningful and useful context
Information
The ______ characteristic of high quality information ensures that all values are correct.
Accuracy
The _______ characteristic of high quality information ensures that each transaction, enitity, and event is represented only once.
Uniqueness
The _______ characteristic of high quality information ensures that none of the values are missing.
Completeness
Information technology is any computer-based tool that people use to work with _____ and support the information and information-processing needs of an organization.
Information
The chief____officer is responsible for collecting, maintaining, and distributing the organization's knowledge.
knowledge
____are the principles and standards that guide our behavior toward other people.
Ethics
_____software involves the unauthorized use, duplication, distribution, or sale of copyrighted software.
pirated
_____is the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
Privacy
_____software is manufactured to look like the real thing and sold as such
counterfeit
Detail, summary and ____ are the typical information granularities.
aggregate
_____ information encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks.
transactional
Organizations use ____ information to make ad hoc decisions.
Analytical
organizations use _____ information to make repetitive decisions.
Transactional
The _____ characteristic of high quality information ensures that the information is current with respect to the business requirement
Timeliness
A ____ key is a field that uniquely identifies a given entity in a table.
primary
a ____ key in the relational database model is a primary key of one table that appears as an attribute in another table.
foreign
An entity class (often called a ____) in the relational database model is a collection of similar entities.
table
CustomerID, CustomerName, ContactName, and CustomerPhone are all examples of _____.
attributes
The ____ database model is a type of database that stores its information in the form of logically related two-dimesional tables
relational
______is the duplication of information, or storing the same information in multiple places
redundancy
A _______ is a logical-collection of information gathered from many different operational databases that supports business analysis activites and decision-making tasks.
data warehouse
Data warehousing extends the transformation of data into ______.
information
a data ____ contains a subset of data warehouse information
mart
a ______ refers to a particular attribute of information
dimension
a ____ is the common term for the representation of multidimensional information.
cube
data ___ is the process of analyzing data to extract information not offered by the raw data alone.
mining
_____ cleansing or scrubbing is the process that weeds out and fixes or discards inconsitent, incorrect, or incomplete information.
information
A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of ______
information
_____ knowledge consists of anything that can be documented, archived and codified often with the help of IT
explicit
_____ knowledge is contained in people's heads
tacit
______ networking analysis is a process of mapping a groups contacts to identify who knows whom and who works with whom
social
when less experienced staff observe more experienced staff to learn how their more experienced collegues approach their work, this is called ________.
shadowing
_____ is the actual recording of the business's transactions, without any analysis of the information
bookkeeping
The ____ phase of the SDLC invloves establishing a high level plan of the intended project and determining project goals.
Planning
The _____ phase involves analyzing end user business requirements and refining project goals and to define functions and operations of the intended system
analysis
The systems development life cycle is the over all process for developing information systems from planning and analysis through ______ and maintenence.
implementation
_____ occurs when developers add extra features that were not a part of the intial requirements
feature creep
____ occurs when the scope of the project increases
scope creep
an error found during the ____ phase is the most expensive to fix
maintenence
_____ is the computers primary working memory in which program instructions and data are stored so that they can be accessed directly by the CPU via the processors high speed external databus
RAM (random access memory)
A ____ area network (MAN) is a computer network that provides connectivity in a geographic area or region larger than that covered by a LAN but smaller than the area covered by a WAN
Metropolitan
____ is the legal protection afforded an expression of an idea such as a song video game and some types of propreitary documents
Copy right
____ implies that contact with be made with only the poeple that had agreed to receive promotions and marketing materials
Opt-in
The ____ of information act allows any person to examine government records unless it would cause an invasion of privacy
Freedom
The ___ Bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer
Bork
IT _____ is the hardware, software, telecommunications equipment that when combined provide the underlying foundation to support the organizations goals
infrastructures
information security____ identify the rules required to maintain information security
policies
____security is a broad term encompassing the protection of information from accidental or intention misuse by persons inside or outside that organization
information
an information security ____ details how an organization will implement the information security policies
plan
Develop the information security policies in the _____ step for creating an information security plan
first
Obtain ____ support is the last step for creating an information security plan
stakeholder
Content filtering, _____, and firewalls are the 3 types of prevention and resistance technologies
Encryption
The most common type of defense within detection and response technologies is _____ softwares
Antivirus
Tokens are small electronic devices that change user passwords _____
automatically
Social engineering is using ones____ skills to trick people into revealing access credentials or other information valuable to the attacker
social
A ______ is a device about the same size as a credit card that contains embedded technologies that can store information and small ammounts of software to perform some limited processing
smart card
intrusion detection software IDS searches for patterns and information and network traffic that indicate ____ and quickly respond to prevent any harm
attacks
____filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
content
info organized into a tree-like structure, allows repeating information is called a _____
hierarchial database model
operating system that runs a network, steering information between computers and managing security and users is a _____
network operating systems
software through which users and application programs interact with the database is a _____
database management system

Deck Info

64

kregan

permalink