Exam 1 Flashcards

(106 cards)

1
Q

Computer-based information systems (CBIS)

A

An information system that uses computer technology to perform some or all of its intended tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data items

A

An elementary description of things, events, activities, and transactions that are recorded, classified, and sorted but are not organized to convey any meeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

enterprise resource planning (ERP) systems

A

information systems that correct a lack of communication among the functional area ISs by tightly integrting the functional area ISs via common database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

functional area information systems (FAISs)

A

ISs that support a particular functional area within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hardware

A

a device such as a processor, monitor, keyboard, or printer Together these devices accept, process, and display data and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information

A

data that have been organized so that they have meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

information systems (IS)

A

collects, processes, stores, analyzes, and disseminates information for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

information technology (IT)

A

relates to any computer-based tool that people use to work with information and support the information and information-processing needs of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

information technology components

A

hardware, software, databases, and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

interorganizational information systems (IOS)

A

information systems that connect two or more organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

knowledge

A

data and/or info that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

knowledge workers

A

professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are expert in a particular subject area and create information and knowledge, which they integrate into business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

procedures

A

the set of instructions for combining hardware, software, database, and network components in order to process info and generate the desired output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software

A

a program or collection of programs that enable the hardware to process data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

transaction processing system (TPS)

A

supports the monitoring, collection, storage, and processing of data from the organization’s basic business transaction, each of which generates data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

business environment

A

the combination of social, legal, economic, physical, and political factors in which businesses conduct their operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business-information technology alignment

A

the tight integration of the IT function with the strategy, mission, and goals of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

business process

A

a collection of related activities that produce a product or service of value to the organization, its business partners, and or its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

business process management (BPM)

A

a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

business process reengineering (BPR)

A

a radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a “clean sheet”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

competitive forces model

A

a business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company’s position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

cross-functional business process

A

a process in which no single functional area is responsible for its completion; multiple functional areas collaborate to perform the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

digital divide

A

the gap between those who have access to information and communications technology and those who do not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

entry barrier

A

product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
globalization
the integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology
26
mass customization
a production process in which items are produced in large quantities but are customized to fit the desires of each customer
27
organizational social responsibility
efforts by organizations to solve various social problems.
28
primary activities
those business activities related to the production and distribution of the firm's products and services, thus creating value
29
strategic information systems (SIS)s
systems that help an organization gain a competitive advantage by supporting its strategic goals and or increasing performance and productivity.
30
support activities
business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value
31
value chain model
model that shows the primary activities that sequentially add value to the profit margin; also shows the support activities
32
value system
includes the producers, suppliers, distributors, and buyers, all with their value chains
33
code of ethics
a collection of principles intended to guide decision making by members of an organization
34
digital dossier
an electronic description of an individual and his or her habits
35
information privacy
the right to determine when, and to what extent, personal information can be gathered by and or communicated by others.
36
liability
a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems
37
opt-in model
a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it
38
opt-out model
a model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.
39
profiling
the process of forming a digital dossier
40
responsibility
a tenet of ethics in which you accept the consequences of your decisions and actions
41
access controls
controls that restrict unauthorized individuals from using information resources and are concerned with user identification
42
adware
alien software designed to help pop-up advertisements appear on your screen.
43
alien software
clandestine software that is installed on your computer through duplicitous methods
44
anti-malware systems
software packages that attempt to identify and eliminate viruses, worms, and other malicious software
45
audit
an examination of information systems, their inputs, outputs, and processing
46
back door
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security proceedures
47
biometrics
the science and technology of authentication by measuring the subject's physilogic or behavioral characteristics
48
blacklisting
a process in which a company identifies certain types of software that are not allowed to run in the company environment
49
certificate authority
a third party that acts as a trusted intermediary between computers by issuing digital certificates and verifying the worth and integrity of the certificates
50
cold site
a backup location that provides only rudimentary services and facilities
51
controls
defense mechanisms
52
cookie
small amounts of information that Web sites store on your computer, temporarily or more or less permanently
53
copyright
a grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
54
cybercrime
illegal activities executed on the internet
55
cyberterrorism
can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups
56
cyberwarfare
war in which a country's information systems could be paralyzed from a massive attack by destructive software
57
demilitarized zone (DMZ)
a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet.
58
denial-of-service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
59
distributed denial-of-service (DDoS) attack
attack that sends a flood of data packets from many compromised computers simultaneously
60
digital certificate
an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format of content.
61
exposure
the harm, loss, or damage that can result if a threat compromises an information resource
62
firewall
a system that prevents a specific type of information from moving between untrusted networks, such as the internet and private networks, such as tour company's network.
63
hot sites
a fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicated your company's computing resources and provides near real-life recovery of IT operations.
64
information security
protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
65
intellectual property
the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
66
least privilege
a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization
67
logic bombs
segments of computer code embedded within an organization's existing computer programs
68
malware
malicious software such as viruses or worms
69
phishing attack
an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking email.
70
physical controls
controls that restrict unauthorized individuals from gaining access to a company's computer facilities
71
piracy
copying a software program without making payment to the owner
72
privilege
a collection of related computer system operations that can be performed by users of the system.
73
public-key encryption
a type of encryption that uses two different keys, a public key and a private key.
74
risk acceptance
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
75
risk analysis
the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised and compares the probable costs of each being compromised with the costs of protecting it
76
risk limitation
a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
77
risk management
a process that identifies, controls, and minimizes the impact of threats, in an effort
78
risk mitigation
a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan
79
risk transference
a process in which the organization transfers the risk by using other means to compensate for a loss such as purchasing insurance
80
secure socket layer (SSL)
an encryption standard used for secure transactions such as credit card purchases and online banking
81
security
the degree of protection against criminal activity, danger, damage, and or loss
82
social engineering
getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorzed
83
spam
unsolicited email
84
spamware
alien software that uses your computer as a launch platform for spammers
85
spyware
alien software that can record your keystrokes and or capture your passwords
86
trade secret
intellectual work, such as a business plan, that is a company secret and is not based on public information
87
Trojan horse
a software program containing a hidden function that presents a security risk
88
tunneling
a process that encrypts packet inside another packet
89
virtual private network (VPN)
a private network
90
viruses
malicious software that can attach itself to other computer programs without the owner of the program being aware of the infection
91
vulnerability
the possibility that an information resource will be harmed by a threat
92
whitelisting
a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity
93
worms
destructive programs that replicate themselves without requiring another program to provide a safe environment for replication
94
Identify several ways in which you depend on information technology in your daily life
texting, email, research, shop, pay bills
95
What are three ways in which information technology can impact managers
1. may reduce middle managers 2. less time to make decisions 3. increase likelihood of having to supervise geographically
96
What are three ways in which information technology can impact nonmanagerial workers
1. may eliminate jobs 2. may cause employees to feel a loss of identity 3. cause job stress and repetitive stress injury
97
List three positives and three negatives societal effects of the increased use of IT
positive: 1. opportunities for disabled people 2. work flexibility 3. improvements in healthcare negative: 1. cause health problems 2. place employees on constant call 3. misinform patients about their health problems
98
List and provide examples of the three types of business pressures, and describe one IT response to each.
1. Market pressures: powerful customers 2. Technology pressures: info overload 3. societal/political/legal pressures: social responsibility (environment)
99
Identify 5 competitive forces
1. threat of new competitors 2. bargaining power of suppliers 3. bargaining power of customers 4. threat of substitute products 5. rivalry amongst existing firms in industry
100
5 strategies to counter competitive forces
1. cost leadership strategy- lowest cost 2. differentiation strategy- different products or services 3. innovation strategy- introduce new products and services 4. operational effectiveness strategy- improve internal business processes 5. customer-orientation strategy- focus on customer's happiness
101
List 3 fundamental tenets of ethics
1. responsibility 2. accountability 3. liability
102
List 4 categories of ethical issues related to information technology
1. privacy 2. accuracy 3. property 4. access to information
103
Identify three places that store data and discuss one personal threat to the privacy of the data stored there.
databases, forums, and social networking sites. the threat is you might post too much that unknown people can see.
104
Identify 5 factors that contribute to vulnerability of information resources and provide an example of each
1. interconnected, wirelessly networked-internet 2. smaller, faster, cheaper, computers and storage devices- ipads thumbdrives 3. decreasing skills necessary to hack-hacking programs on the internet 4. international organized crime taking over cybercrime-cartels 5. lack of management support
105
10 types of deliberate attacks
1. espionage or trespass 2. information extortion 3. sabotage and vandalism 4. theft of equipment 5. identity theft 6. protecting intellectual property 7. software attacks 8. alien software 9. supervisory control and data acquisition 10. cyberterrorism or cyberwarfare
106
Identify three major types of controls that organization can use to protect their information resources.
1. physical controls 2. access controls 3. communication controls