Glossary Flashcards
(170 cards)
10/100/1000 Ethernet
A type of Ethernet that conforms to the IEEE 802.3 protocol and allows for transmission at a rate of 10, 100, or 1,000 Mbps (megabits per second).
Abstract reasoning
The ability to make and manipulate models. One of the four key skills for nonroutine cognitive thinking.
Access
A popular personal and small workgroup DBMS product licensed by Microsoft. Included with some versions of Microsoft Office.
ACID
An acronym standing for atomic, consistent, isolated, and durable. Used to describe the processing of transactions such that all of the transaction is processed or none of it is (atomic), transactions are processed in the same manner (consistent) whether processed alone or in the presence of millions of other transactions (isolated), and that once a transaction is stored it never goes away—even in the presence of failure (durable)
Activity
A business function that receives inputs and produces outputs. An activity can be performed by a human, by a computer system, or by both.
Ad-blocking software
Software that filters out advertising content.
Advanced Persistent Threat (APT)
A sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments. APTs are a means to engage in cyberwarfare.
Adware
Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and, unknown to the user, observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads.
Agile development
An adaptive project management process based on the principles:
- Expect, even welcome, changes in requirements.
- Frequently deliver working version of the product.
- Work closely with customer for the duration.
- Design as you go.
- Test as you go.
- Team knows best how it’s doing/how to change.
- Can be used for business processes, information systems, and applications development.
Can be used for the management of many types of projects, including processes, information systems, and applications
An adaptive project management process based on the principles listed in Figure 12-20 . Can be used for the management of many types of projects, including processes, information systems, and applications
A mobile operating system that is a version of Linux. Android runs on the Google Nexus 7 and the Amazon Kindle Fire as well as many other mobile devices
Application
(1) Synonym for application software. (2) A combination of hardware, software, and data that is to be developed for an information system.
Application software
Programs that perform a business function. Some application programs are general purpose, such as Excel or Word. Other application programs are specific to a business function, such as accounts payable
Artificial intelligence (AI)
The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making.
As-is model
A model that represents the current situation and processes.
Asymmetric encryption
An encryption method whereby different keys are used to encode and to decode the message; one key encodes the message, and the other key decodes the message. Asymmetric encryption is slower and more complicated than symmetric encryption.
Asynchronous communication
Information exchange that occurs when all members of a work team do not meet at the same time, such as those who work different shifts.
Attributes
Characteristics of an entity. Example attributes of Order are OrderNumber, OrderDate, SubTotal, Tax, Total, and so forth. Example attributes of Salesperson are SalespersonName, Email, Phone, and so forth.
Augmented reality (AR)
The altering of reality by overlaying digital information on real world objects.
Authentication
The process whereby an information system verifies (validates) a user.
Baseline WBS
The initial work breakdown structure that shows the planned tasks, dependencies, durations, and resource assignments.
Bell’s Law
A new computer class forms roughly each decade, establishing a new industry.
Best practices
Methods that have been shown to produce successful results in prior implementations.
BI analysis
The process of creating business intelligence. The four fundamental categories of BI analysis are reporting, data mining, Big Data, and knowledge management
BI application
The software component of a BI system.