This site is 100% ad supported. Please add an exception to adblock for this site.

MIS Management Information Systems Quiz

Terms

undefined, object
copy deck
Random access memory (RAM)
High-speed memory chips that hold data for immediate processing. On most computers, data held in RAM is lost when the power is removed, so data must be moved to secondary storage.
Read Only Memory (ROM)
A type of memory on which data can be stored only one time. It can be read as often as needed but cannot be changed. ROM keeps its data when power is removed, so it is used to hold certain core programs and system data that is rarely changed.
Reduced instruction set computer (RISC)
When designing a RISC processor, the manufacturer deliberately limits the number of circuits and instructions on the chip. The goal is to create a processor that performs a few simple tasks very fast. More complex problems are solved in software. Because RISC processors require fewer circuits, they are easier to produce
Rapid application development (RAD)
The goal of building a system much faster than with traditional SDLC methods. Using powerful tools (database management system, high-level languages, graphical toolkits, and objects), highly trained programmers can build systems in a matter of weeks or months. Using workgroups, communication networks, and CASE tools, small teams can speed up the development and design steps.
Redundant Array of Independent Disks (RAID)
Instead of containing one large drive, a RAID system consists of several smaller drives. Large files are split into pieces stored on several different physical drives. The data pieces can be duplicated and stored in more than one location for backup. RAID systems also provide faster access to the data, because each of the drives can be searching through their part of the file at the same time.
Query by example (QBE)
A visual method of examining data stored in a relational database. You ask questions and examine the data by pointing to tables on the screen and filling in templates.
Prototyping
An iterative system design technique that takes advantage of high-level tools to rapidly create working systems. The main objective of prototyping is to create a working version of the system as quickly as possible, even if some components are not included in the early versions.
Properties
See Attributes
Pseudocode
A loosely structured method to describe the logic of a program or outline a system. It uses basic programming techniques but ignores issues of syntax and relies on verbal descriptions
Protocols
A set of definitions and standards that establish the communication links on a network. Networks are often classified by their choice of protocol. Common protocols include Ethernet, Token Ring, and TCP/IP.
Public key
In a dual-key encryption system, the key that is given to the public. Each person wishing to use dual-key encryption must have a different public key. The key works only in tandem with the user's private key

Deck Info

11

permalink