flashcards

(41 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems

A

A coordinated set of components for collecting, storing, and processing data and delivering information, knowledge, and digital products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ERP (Enterprise Resource Planning)

A

Integrated software systems used to manage and automate core business processes across various departments in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPS (Transaction Processing System)

A

A system that collects, stores, modifies, and retrieves the data transactions of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CRM (Customer Relationship Management)

A

A strategy and software system used to manage interactions with current and potential customers, aiming to improve relationships and business outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy Systems

A

Older computer systems or applications that are still in use, often due to their critical role in business operations, despite being outdated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCMS (Supply Chain Management Systems)

A

Software solutions that facilitate the management of supply chain activities, from procurement to production to distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MIS (Management Information Systems)

A

Systems that provide managers with tools to organize, evaluate, and manage departments within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSS (Decision Support System)

A

Computer-based information systems that support decision-making activities by analyzing data and presenting actionable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EIS (Executive Information System)

A

A specialized DSS designed to help executives make strategic decisions by providing easy access to internal and external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sustaining Information Systems

A

Systems that support ongoing operations and maintenance of an organization’s current business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Strategic Information Systems

A

Systems that provide a competitive advantage by helping organizations achieve strategic goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IS Reference Disciplines

A

Various academic fields that contribute to the study and practice of Information Systems, including computer science, management science, and economics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPU (Central Processing Unit)

A

The primary component of a computer that performs most of the processing inside a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computational Speed

A

The rate at which a computer or processing unit can execute instructions and perform calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HDD vs. SSD

A

HDD (Hard Disk Drive) uses spinning disks for storage, while SSD (Solid State Drive) uses flash memory, offering faster data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Primary vs. Secondary Storage

A

Primary storage is fast and temporary (e.g., RAM), while secondary storage is slower but long-term (e.g., HDD, SSD).

18
Q

Volatile vs. Non-Volatile

A

Volatile memory requires power to maintain data (e.g., RAM), while non-volatile memory retains data without power (e.g., ROM).

19
Q

RAM (Random Access Memory)

A

A type of volatile memory that stores data actively being used by the CPU.

20
Q

ROM (Read-Only Memory)

A

Non-volatile memory that is permanently programmed with data and retains it even when the power is off.

21
Q

Cloud Services

A

Services delivered over the internet, allowing access to data and applications remotely, including IaaS, PaaS, and SaaS.

22
Q

Guided Network Media

A

Communication medium using physical conduits to transmit data, such as twisted pair and fiber optic cables.

23
Q

Network Protocols

A

Rules and conventions for transmitting data over a network, such as TCP/IP and HTTP.

24
Q

Network Bandwidth

A

The maximum rate of data transfer across a network connection, measured in bits per second.

25
IP Address
A unique identifier assigned to each device on a network that uses the Internet Protocol for communication.
26
Ping
A network utility used to test the reachability of a host and measure round-trip time for messages.
27
HTTP (Hypertext Transfer Protocol)
A protocol for transmitting hypertext via the World Wide Web, facilitating communication between browsers and servers.
28
VPN (Virtual Private Network)
A technology that creates a secure and encrypted connection over the internet for privacy and security.
29
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on security rules.
30
CIA Triad
A model focusing on three key principles: Confidentiality, Integrity, and Availability in information security.
31
2FA (Two-Factor Authentication)
A security process requiring two forms of identification to verify a user's identity.
32
DoS and DDoS Attacks
DoS (Denial of Service) attacks overwhelm a target with traffic, while DDoS (Distributed Denial of Service) uses multiple compromised systems.
33
Encryption
A process that transforms data into a coded format to prevent unauthorized access.
34
Malware Types
Various malicious software forms, including viruses, worms, trojans, ransomware, spyware, adware, and rootkits.
35
Authentication
The process of verifying the identity of a user, device, or system before granting access to resources.
36
Authorization
The process of granting permission to a user to access specific resources after their identity has been authenticated.
37
System Vulnerabilities
Weaknesses in a system that can be exploited by attackers to gain unauthorized access or cause harm.
38
Network Sniffing
The practice of monitoring and capturing data packets traveling over a network, which can be used for legitimate or malicious purposes.
39
Checksums
A value calculated from data to verify its integrity during transmission or storage.
40
AI Ethics, Privacy, and Security
Concerns regarding the moral implications of AI, individual privacy rights, and the security of AI systems.
41
Malicious and Non-Malicious Insiders
Malicious insiders exploit access for harm, while non-malicious insiders cause breaches inadvertently through negligence.