k201 midterm1
Terms
undefined, object
copy deck
- ________information systems is the function that plans for, develops, implements and maintains IT hardware, software, and applications that people use to support the goals of an organization
- Management
- ______are raw facts that describe the characteristics of an event
- Data
- _______is data converted into a meaningful and useful context
- Information
- The ______ characteristic of high quality information ensures that all values are correct.
- Accuracy
- The _______ characteristic of high quality information ensures that each transaction, enitity, and event is represented only once.
- Uniqueness
- The _______ characteristic of high quality information ensures that none of the values are missing.
- Completeness
- Information technology is any computer-based tool that people use to work with _____ and support the information and information-processing needs of an organization.
- Information
- The chief____officer is responsible for collecting, maintaining, and distributing the organization's knowledge.
- knowledge
- ____are the principles and standards that guide our behavior toward other people.
- Ethics
- _____software involves the unauthorized use, duplication, distribution, or sale of copyrighted software.
- pirated
- _____is the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
- Privacy
- _____software is manufactured to look like the real thing and sold as such
- counterfeit
- Detail, summary and ____ are the typical information granularities.
- aggregate
- _____ information encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks.
- transactional
- Organizations use ____ information to make ad hoc decisions.
- Analytical
- organizations use _____ information to make repetitive decisions.
- Transactional
- The _____ characteristic of high quality information ensures that the information is current with respect to the business requirement
- Timeliness
- A ____ key is a field that uniquely identifies a given entity in a table.
- primary
- a ____ key in the relational database model is a primary key of one table that appears as an attribute in another table.
- foreign
- An entity class (often called a ____) in the relational database model is a collection of similar entities.
- table
- CustomerID, CustomerName, ContactName, and CustomerPhone are all examples of _____.
- attributes
- The ____ database model is a type of database that stores its information in the form of logically related two-dimesional tables
- relational
- ______is the duplication of information, or storing the same information in multiple places
- redundancy
- A _______ is a logical-collection of information gathered from many different operational databases that supports business analysis activites and decision-making tasks.
- data warehouse
- Data warehousing extends the transformation of data into ______.
- information
- a data ____ contains a subset of data warehouse information
- mart
- a ______ refers to a particular attribute of information
- dimension
- a ____ is the common term for the representation of multidimensional information.
- cube
- data ___ is the process of analyzing data to extract information not offered by the raw data alone.
- mining
- _____ cleansing or scrubbing is the process that weeds out and fixes or discards inconsitent, incorrect, or incomplete information.
- information
- A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of ______
- information
- _____ knowledge consists of anything that can be documented, archived and codified often with the help of IT
- explicit
- _____ knowledge is contained in people's heads
- tacit
- ______ networking analysis is a process of mapping a groups contacts to identify who knows whom and who works with whom
- social
- when less experienced staff observe more experienced staff to learn how their more experienced collegues approach their work, this is called ________.
- shadowing
- _____ is the actual recording of the business's transactions, without any analysis of the information
- bookkeeping
- The ____ phase of the SDLC invloves establishing a high level plan of the intended project and determining project goals.
- Planning
- The _____ phase involves analyzing end user business requirements and refining project goals and to define functions and operations of the intended system
- analysis
- The systems development life cycle is the over all process for developing information systems from planning and analysis through ______ and maintenence.
- implementation
- _____ occurs when developers add extra features that were not a part of the intial requirements
- feature creep
- ____ occurs when the scope of the project increases
- scope creep
- an error found during the ____ phase is the most expensive to fix
- maintenence
- _____ is the computers primary working memory in which program instructions and data are stored so that they can be accessed directly by the CPU via the processors high speed external databus
- RAM (random access memory)
- A ____ area network (MAN) is a computer network that provides connectivity in a geographic area or region larger than that covered by a LAN but smaller than the area covered by a WAN
- Metropolitan
- ____ is the legal protection afforded an expression of an idea such as a song video game and some types of propreitary documents
- Copy right
- ____ implies that contact with be made with only the poeple that had agreed to receive promotions and marketing materials
- Opt-in
- The ____ of information act allows any person to examine government records unless it would cause an invasion of privacy
- Freedom
- The ___ Bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer
- Bork
- IT _____ is the hardware, software, telecommunications equipment that when combined provide the underlying foundation to support the organizations goals
- infrastructures
- information security____ identify the rules required to maintain information security
- policies
- ____security is a broad term encompassing the protection of information from accidental or intention misuse by persons inside or outside that organization
- information
- an information security ____ details how an organization will implement the information security policies
- plan
- Develop the information security policies in the _____ step for creating an information security plan
- first
- Obtain ____ support is the last step for creating an information security plan
- stakeholder
- Content filtering, _____, and firewalls are the 3 types of prevention and resistance technologies
- Encryption
- The most common type of defense within detection and response technologies is _____ softwares
- Antivirus
- Tokens are small electronic devices that change user passwords _____
- automatically
- Social engineering is using ones____ skills to trick people into revealing access credentials or other information valuable to the attacker
- social
- A ______ is a device about the same size as a credit card that contains embedded technologies that can store information and small ammounts of software to perform some limited processing
- smart card
- intrusion detection software IDS searches for patterns and information and network traffic that indicate ____ and quickly respond to prevent any harm
- attacks
- ____filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
- content
- info organized into a tree-like structure, allows repeating information is called a _____
- hierarchial database model
- operating system that runs a network, steering information between computers and managing security and users is a _____
- network operating systems
- software through which users and application programs interact with the database is a _____
- database management system