Reset Password Free Sign Up

incorrect cards (0)
correct cards (0)
remaining cards (0)
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the Correct box, the DOWN ARROW key to move the card to the Incorrect box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

Correct box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

MIS Final


Productivity Paradox Given the vast number of potential systems and technologies that could be developed or acquired, a strong business case aids the decision making process and helps direct resources in more strategic ways
System Effectiveness Result of the biggest increase in productivity
System Efficiency Accomplishing things faster at lower costs
Redistribution A new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole
Mismanagement A system is implemented but not managed well
Managers use the 3 F's when making a successful business case Faith,Fear,Fact
TCO Total Cost of Ownership One goal of a cost-benefit analysis
Nonrecurring Costs one-time costs that are not expected to continue after the system is implemented
Recurring Costs Ongoing Costs that occur throughout the life of a system
Tangible Costs Relatively easy to quantify
Intangible Costs Will not easily fit into quantitative analysis but should be accounted for
Break-Even Analysis type of Cost-benefit analysis to identify at what point tangible benefits equal tangible costs
Net-Present-Value Analysis Cost-benefit analysis relevent to cash flow steams associated with the system at the organization's dicount rate
Discount Rate The rate of return used by an organization to compute the present value of futre cash flows
Systems Analysis and Design The process of designing, building, and maintaining information systems
Systems Analyst Performs the process of designing, building, and maintaining information systems
Project Manager Oversees the system analyst and responsible for ensuring that the system is successful
SDLC Systems Development Life Cycle, Describes the lifespan of an information system
System Planning and Selection Formal process mainly to identify, plan, and select a development project from all possible projects that can be performed
Systems Analysis Designers gain a full understanding of the organizations current systems and then decide which new info system will be constructed
Pseudocode Used by systems analysts to express the way in data is transformed
Data Flows Represents the movement of data through an organization or within an info system
System Design Elements Human-Computer interface,Databases and files,Processing and logic
HCI Human-Computer Interface, the point of contact between a system and a user
Designing Processing and Logic Steps and procedures that transform raw data inputs into new or modified information
Order of Phases of the Systems Development Life Cycle Systems Planning and Selection,Systems analysis,Systems Design,Systems Implementation and Operation,Systems Maintnenance
Making a Business Case Refers to the process of identifying, quantifying, and presenting the value provided by a system
Weighted Multicriteria Analysis Method for deciding among different IS investments or when considering alternative designs for a system
Proxy Variables Alternative measures of outcomes when it is not easy to quantify the impact of an investment
Patch Management Systems System that uses the internet to to check for available patchs and/or updates
Prototyping Alternative to SDLC, which uses a trial-and-error approach for discovering how a system should operate
Corrective Maintenance Making changes to an information system to repair flaws in the design, coding, and implementation
Adaptive Maintenance Making changes to accommodate changes in business needs
Perfective Maintenance Making enhancements to improve processing performance or interface
Preventive Maintenance Making changes to a system to reduce the chance of future system failure
End-User Development Individuals within organizations build increasingly complex and useful applications after the system has already been implemented
External Acquisition Purchasing an existing system from an outside vendor such as IBM, HP Enterprise Services, or Accenture
RFP Request For Proposal A document that is used to tell vendors what an organizations requirements are
Systems Benchmarking Used to standardize performance tests to facilitate comparison between systems
Shrink-Wrap Licenses Contract is activated when the shrink wrap on the packaging is removed
Click-Wrap Licenses A license primarily used for downloaded software
Enterprise License License that usually contain limitations of liability and warranty disclaimers
Computer Crime The act of using a computer to commit an illegal act
Hackers Individuals who are knowledgeable enough to gain access to a computer system without authorization
Hacktivists Computer crimminals that attempt to break into systems or deface websites to promote political or idealogical goals
Crackers Individuals who break into computer systems with the intention of doing damage or committing a crime
Information Modification Occurs when someone accesses electronic information and then changes the information
Malware short for "malicious software" Refers to harmful Viruses, Worms, and Trojan horses
Virus Desructive program that disrupts the normal functioning of computer systems
Worm A variation of a Virus that is targeted at networks ultimately denying intenet access to users
Trojan Horse Destructive program like a virus, but does not copy itself
Logic Bombs or Time Bombs Variations of Trojan horses that lie in wait for unsuspecting computer users to perform a triggering operation
Zombie Computers Intruders infect computers located in homes, schools, and business with viruses or worms
Spyware Any software that covertly gathers information about a user through an Intenet connection
Adware Free software paid for by advertisements appearing during the use of the software
Spam Electronic junk mail or junk newsgroup postings
Phishing Used by spam e-mail to trick financial accounts and credit card holders into giving away their authorization information
CAPTCHA Completely Automated Public Turning Test to Tell Computers and Humans Apart
Cookies A message passed to a Web browser on a user's computer by a Web server to be stored as a text file on the computer
Cybersquating Dubious practice of registering a domain name and then trying to sell the name for money to the person, company, or organization that wants it
Intellectual Property Software for patent and copyright laws applied to works used in commerce
Patents Refers to process, machine, or material inventions
Copyrights Refers to creations of the mind such as music, literature, or software
Warez Slang term for stolen software
Information System Security Refers to precautions taken to keep all aspects of information systems safe
Risk Analysis process in which you access the value of the assets being protected
Risk Reduction Active countermeasures to protect your systems
Risk Acceptance Implementing no countermeasures and simply absorbing any damages that occur
Risk Transference Having someone else absorb the risk
Biometrics Sophisticated form of authentication used to govern access to systems, data, and/or facilities
Access-Control Software Special software used to keep stored information secure
VPN Virtual Private Network A network connection that is constructed dynamically within an existing network Also known as a secure tunnel
Firewall A part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network
Encryption Process of encoding messages before they enter the network to be securley transfered to the intended recipient
Secure Sockets Layer Popular public key encryption method used on the internet, created by Netscape
Audit-Control Software Used to keep track of computer activity so that auditors can spot suspicious activity and take action
Backups Important files saved to external hard drives
Cold Backup Site Empty warehouse with all necessary connections for power and communication
Hot Backup Site Fully equiped backup facility with exact replication of the most current data
Mirrored Everything is stored synchronously on two independent systems
Closed-Circuit Television Systems that monitor for physical intruders such as video cameras
Collocation Facilities Rented space for backup storage for only a few servers
Computer Forensics Use of formal invesitgative techniques to evalute digital information for judicial review
Honeypot A computer, data, or network site that is designed to lure crackers
Information System Audit Helps organizations assess the state of their IS controls to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity
Sarbanes-Oxley Act Government regulations on the requirement of controls in place to prevent misuse or fraud, controls to detect problem, and effective measures to correct problems
Botherder A criminal that has a botnet residing on a collection of zombie computers
Requirements Collection Process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how an IS should function
Developmental Testing Testing the correctness of individual modules and the integration of multiple modules performed by the programmer
Alpha Testing Testing of overall system to see whether it meets design requirements Performed by Software Tester
Beta Testing Testing of the capabilities of the system in the user enviroment with actual data Performed by actual system users
Recovery Time Objectives Specifies the maximum time allowed to recover from a catastrophic event
Recovery Point Objectives Specifies how current the back data should be
3 Authentication Forms Something You Have- Ex. Keys,Something You Know- Ex. Password,Something You Are- Ex. Fingerprint
Acceptable Use Policies Policies for people within the organization, with clearly spelled out penalties for noncompliance
Created by: united11 on 2011-12-11

Copyright ©2001-2014  StudyStack LLC   All rights reserved.