Chapter 17 - Terms Flashcards

1
Q

Moore’s law

A

the prediction that about every two years, computer processing power would double and its cost would drop by 50 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Raw data

A

facts and figures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information

A

useful data that can influence people’s choices and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

First-mover advantage

A

the strategic advantage that companies earn by being the first to use new information technology to substantially lower costs or to make a product or service different from that of competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acquisition cost

A

the cost of obtaining data that you don’t have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Processing cost

A

the cost of turning raw data into usable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

data silo

A

is an isolated data set that is difficult to obtain, combine or use with other company data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data variety

A

that is, data that are formatted or structured in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Storage cost

A

the cost of physically or electronically archiving information for later retrieval and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Retrieval cost

A

the cost of accessing already-stored and processed information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Communication cost

A

the cost of transmitting information from one place to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bar code

A

a visual pattern that represents numerical data by varying the thickness and pattern of vertical bars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Radio frequency identification (RFID) tags

A

tags containing minuscule microchips that transmit information via radio waves and can be used to track the number and location of the objects into which the tags have been inserted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Electronic scanner

A

an electronic device that converts printed text and pictures into digital images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Optical character recognition

A

the ability of software to convert digitized documents into ASCII (American Standard Code for Information Interchange) text that can be searched, read, and edited by word processing and other kinds of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Processing information

A

transforming raw data into meaningful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data mining

A

the process of discovering unknown patterns and relationships in large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data warehouse

A

a database that stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy

19
Q

Supervised data mining

A

the process when the user tells the data mining software to look and test for specific patterns and relationships in a data set

20
Q

Unsupervised data mining

A

the process when the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set

21
Q

Association or affinity patterns

A

when two or more database elements tend to occur together in a significant way

22
Q

Sequence patterns

A

when two or more database elements occur together in a significant pattern in which one of the elements precedes the other

23
Q

Predictive patterns

A

patterns that help identify database elements that are different

24
Q

Data clusters

A

when three or more database elements occur together (that is, cluster) in a significant way

25
Q

Protecting information

A

the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else

26
Q

Authentication

A

making sure potential users are who they claim to be

27
Q

Authorization

A

granting authenticated users approved access to data, software, and systems

28
Q

Two-factor authentication

A

authentication based on what users know, such as a password and what they have in their possession, such as a secure ID card or key

29
Q

Firewall

A

a protective hardware or software device that sits between the computers in an internal organizational network and outside networks, such as the Internet

30
Q

Virus

A

a program or piece of code that, without your knowledge, attaches itself to other programs on your computer and can trigger anything from a harmless flashing message to the reformatting of your hard drive to a system-wide network shutdown

31
Q

Data encryption

A

the transformation of data into complex, scrambled digital codes that can be decrypted only by authorized users who possess unique decryption keys

32
Q

Virtual private network (VPN)

A

software that securely encrypts data sent by employees outside the company network, decrypts the data when they arrive within the company computer network, and does the same when data are sent back to employees outside the network

33
Q

Secure sockets layer (SSL) encryption

A

Internet browser–based encryption that provides secure off-site web access to some data and programs

34
Q

Executive information system (EIS)

A

a data processing system that uses internal and external data sources to provide the information needed to monitor and analyze organizational performance

35
Q

Intranets

A

private company networks that allow employees to easily access, share, and publish information using Internet software

36
Q

Corporate portal

A

a hybrid of executive information systems and intranets that allows managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions

37
Q

Electronic data interchange (EDI)

A

when two companies convert their purchase and ordering information to a standardized format to enable the direct electronic transmission of that information from one company’s computer system to the other company’s computer system

38
Q

Web services

A

software that uses standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company

39
Q

Extranets

A

networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, web-based access to authorized parts of a company’s intranet or information system

40
Q

Knowledge

A

the understanding that one gains from information

41
Q

Decision support system (DSS)

A

an information system that helps managers understand specific kinds of problems and potential solutions

42
Q

Expert system

A

an information system that contains the specialized knowledge and decision rules used by experts and experienced decision makers so that nonexperts can draw on this knowledge base to make decisions

43
Q

Artificial intelligence, or AI

A

the capability of computerized systems to learn and adapt through experience