Terms
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Productivity Paradox | Given the vast number of potential systems and technologies that could be developed or acquired, a strong business case aids the decision making process and helps direct resources in more strategic ways
🗑
|
||||
System Effectiveness | Result of the biggest increase in productivity
🗑
|
||||
System Efficiency | Accomplishing things faster at lower costs
🗑
|
||||
Redistribution | A new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole
🗑
|
||||
Mismanagement | A system is implemented but not managed well
🗑
|
||||
Managers use the 3 F's when making a successful business case | Faith,Fear,Fact
🗑
|
||||
TCO | Total Cost of Ownership One goal of a cost-benefit analysis
🗑
|
||||
Nonrecurring Costs | one-time costs that are not expected to continue after the system is implemented
🗑
|
||||
Recurring Costs | Ongoing Costs that occur throughout the life of a system
🗑
|
||||
Tangible Costs | Relatively easy to quantify
🗑
|
||||
Intangible Costs | Will not easily fit into quantitative analysis but should be accounted for
🗑
|
||||
Break-Even Analysis | type of Cost-benefit analysis to identify at what point tangible benefits equal tangible costs
🗑
|
||||
Net-Present-Value Analysis | Cost-benefit analysis relevent to cash flow steams associated with the system at the organization's dicount rate
🗑
|
||||
Discount Rate | The rate of return used by an organization to compute the present value of futre cash flows
🗑
|
||||
Systems Analysis and Design | The process of designing, building, and maintaining information systems
🗑
|
||||
Systems Analyst | Performs the process of designing, building, and maintaining information systems
🗑
|
||||
Project Manager | Oversees the system analyst and responsible for ensuring that the system is successful
🗑
|
||||
SDLC | Systems Development Life Cycle, Describes the lifespan of an information system
🗑
|
||||
System Planning and Selection | Formal process mainly to identify, plan, and select a development project from all possible projects that can be performed
🗑
|
||||
🗑
|
|||||
Systems Analysis | Designers gain a full understanding of the organizations current systems and then decide which new info system will be constructed
🗑
|
||||
Pseudocode | Used by systems analysts to express the way in data is transformed
🗑
|
||||
Data Flows | Represents the movement of data through an organization or within an info system
🗑
|
||||
System Design Elements | Human-Computer interface,Databases and files,Processing and logic
🗑
|
||||
HCI | Human-Computer Interface, the point of contact between a system and a user
🗑
|
||||
Designing Processing and Logic | Steps and procedures that transform raw data inputs into new or modified information
🗑
|
||||
Order of Phases of the Systems Development Life Cycle | Systems Planning and Selection,Systems analysis,Systems Design,Systems Implementation and Operation,Systems Maintnenance
🗑
|
||||
Making a Business Case | Refers to the process of identifying, quantifying, and presenting the value provided by a system
🗑
|
||||
Weighted Multicriteria Analysis | Method for deciding among different IS investments or when considering alternative designs for a system
🗑
|
||||
Proxy Variables | Alternative measures of outcomes when it is not easy to quantify the impact of an investment
🗑
|
||||
Patch Management Systems | System that uses the internet to to check for available patchs and/or updates
🗑
|
||||
Prototyping | Alternative to SDLC, which uses a trial-and-error approach for discovering how a system should operate
🗑
|
||||
Corrective Maintenance | Making changes to an information system to repair flaws in the design, coding, and implementation
🗑
|
||||
Adaptive Maintenance | Making changes to accommodate changes in business needs
🗑
|
||||
Perfective Maintenance | Making enhancements to improve processing performance or interface
🗑
|
||||
Preventive Maintenance | Making changes to a system to reduce the chance of future system failure
🗑
|
||||
End-User Development | Individuals within organizations build increasingly complex and useful applications after the system has already been implemented
🗑
|
||||
External Acquisition | Purchasing an existing system from an outside vendor such as IBM, HP Enterprise Services, or Accenture
🗑
|
||||
RFP | Request For Proposal A document that is used to tell vendors what an organizations requirements are
🗑
|
||||
Systems Benchmarking | Used to standardize performance tests to facilitate comparison between systems
🗑
|
||||
Shrink-Wrap Licenses | Contract is activated when the shrink wrap on the packaging is removed
🗑
|
||||
Click-Wrap Licenses | A license primarily used for downloaded software
🗑
|
||||
Enterprise License | License that usually contain limitations of liability and warranty disclaimers
🗑
|
||||
Computer Crime | The act of using a computer to commit an illegal act
🗑
|
||||
Hackers | Individuals who are knowledgeable enough to gain access to a computer system without authorization
🗑
|
||||
Hacktivists | Computer crimminals that attempt to break into systems or deface websites to promote political or idealogical goals
🗑
|
||||
Crackers | Individuals who break into computer systems with the intention of doing damage or committing a crime
🗑
|
||||
Information Modification | Occurs when someone accesses electronic information and then changes the information
🗑
|
||||
Malware | short for "malicious software" Refers to harmful Viruses, Worms, and Trojan horses
🗑
|
||||
Virus | Desructive program that disrupts the normal functioning of computer systems
🗑
|
||||
Worm | A variation of a Virus that is targeted at networks ultimately denying intenet access to users
🗑
|
||||
Trojan Horse | Destructive program like a virus, but does not copy itself
🗑
|
||||
Logic Bombs or Time Bombs | Variations of Trojan horses that lie in wait for unsuspecting computer users to perform a triggering operation
🗑
|
||||
Zombie Computers | Intruders infect computers located in homes, schools, and business with viruses or worms
🗑
|
||||
Spyware | Any software that covertly gathers information about a user through an Intenet connection
🗑
|
||||
Adware | Free software paid for by advertisements appearing during the use of the software
🗑
|
||||
Spam | Electronic junk mail or junk newsgroup postings
🗑
|
||||
Phishing | Used by spam e-mail to trick financial accounts and credit card holders into giving away their authorization information
🗑
|
||||
CAPTCHA | Completely Automated Public Turning Test to Tell Computers and Humans Apart
🗑
|
||||
Cookies | A message passed to a Web browser on a user's computer by a Web server to be stored as a text file on the computer
🗑
|
||||
Cybersquating | Dubious practice of registering a domain name and then trying to sell the name for money to the person, company, or organization that wants it
🗑
|
||||
Intellectual Property | Software for patent and copyright laws applied to works used in commerce
🗑
|
||||
Patents | Refers to process, machine, or material inventions
🗑
|
||||
Copyrights | Refers to creations of the mind such as music, literature, or software
🗑
|
||||
Warez | Slang term for stolen software
🗑
|
||||
Information System Security | Refers to precautions taken to keep all aspects of information systems safe
🗑
|
||||
Risk Analysis | process in which you access the value of the assets being protected
🗑
|
||||
Risk Reduction | Active countermeasures to protect your systems
🗑
|
||||
Risk Acceptance | Implementing no countermeasures and simply absorbing any damages that occur
🗑
|
||||
Risk Transference | Having someone else absorb the risk
🗑
|
||||
Biometrics | Sophisticated form of authentication used to govern access to systems, data, and/or facilities
🗑
|
||||
Access-Control Software | Special software used to keep stored information secure
🗑
|
||||
VPN | Virtual Private Network A network connection that is constructed dynamically within an existing network Also known as a secure tunnel
🗑
|
||||
Firewall | A part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network
🗑
|
||||
Encryption | Process of encoding messages before they enter the network to be securley transfered to the intended recipient
🗑
|
||||
Secure Sockets Layer | Popular public key encryption method used on the internet, created by Netscape
🗑
|
||||
Audit-Control Software | Used to keep track of computer activity so that auditors can spot suspicious activity and take action
🗑
|
||||
Backups | Important files saved to external hard drives
🗑
|
||||
Cold Backup Site | Empty warehouse with all necessary connections for power and communication
🗑
|
||||
Hot Backup Site | Fully equiped backup facility with exact replication of the most current data
🗑
|
||||
Mirrored | Everything is stored synchronously on two independent systems
🗑
|
||||
Closed-Circuit Television | Systems that monitor for physical intruders such as video cameras
🗑
|
||||
Collocation Facilities | Rented space for backup storage for only a few servers
🗑
|
||||
Computer Forensics | Use of formal invesitgative techniques to evalute digital information for judicial review
🗑
|
||||
Honeypot | A computer, data, or network site that is designed to lure crackers
🗑
|
||||
Information System Audit | Helps organizations assess the state of their IS controls to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity
🗑
|
||||
Sarbanes-Oxley Act | Government regulations on the requirement of controls in place to prevent misuse or fraud, controls to detect problem, and effective measures to correct problems
🗑
|
||||
Botherder | A criminal that has a botnet residing on a collection of zombie computers
🗑
|
||||
Requirements Collection | Process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how an IS should function
🗑
|
||||
Developmental Testing | Testing the correctness of individual modules and the integration of multiple modules performed by the programmer
🗑
|
||||
Alpha Testing | Testing of overall system to see whether it meets design requirements Performed by Software Tester
🗑
|
||||
Beta Testing | Testing of the capabilities of the system in the user enviroment with actual data Performed by actual system users
🗑
|
||||
Recovery Time Objectives | Specifies the maximum time allowed to recover from a catastrophic event
🗑
|
||||
Recovery Point Objectives | Specifies how current the back data should be
🗑
|
||||
3 Authentication Forms | Something You Have- Ex. Keys,Something You Know- Ex. Password,Something You Are- Ex. Fingerprint
🗑
|
||||
Acceptable Use Policies | Policies for people within the organization, with clearly spelled out penalties for noncompliance
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
united11
Popular Business sets