Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Productivity Paradox   Given the vast number of potential systems and technologies that could be developed or acquired, a strong business case aids the decision making process and helps direct resources in more strategic ways  
🗑
System Effectiveness   Result of the biggest increase in productivity  
🗑
System Efficiency   Accomplishing things faster at lower costs  
🗑
Redistribution   A new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole  
🗑
Mismanagement   A system is implemented but not managed well  
🗑
Managers use the 3 F's when making a successful business case   Faith,Fear,Fact  
🗑
TCO   Total Cost of Ownership One goal of a cost-benefit analysis  
🗑
Nonrecurring Costs   one-time costs that are not expected to continue after the system is implemented  
🗑
Recurring Costs   Ongoing Costs that occur throughout the life of a system  
🗑
Tangible Costs   Relatively easy to quantify  
🗑
Intangible Costs   Will not easily fit into quantitative analysis but should be accounted for  
🗑
Break-Even Analysis   type of Cost-benefit analysis to identify at what point tangible benefits equal tangible costs  
🗑
Net-Present-Value Analysis   Cost-benefit analysis relevent to cash flow steams associated with the system at the organization's dicount rate  
🗑
Discount Rate   The rate of return used by an organization to compute the present value of futre cash flows  
🗑
Systems Analysis and Design   The process of designing, building, and maintaining information systems  
🗑
Systems Analyst   Performs the process of designing, building, and maintaining information systems  
🗑
Project Manager   Oversees the system analyst and responsible for ensuring that the system is successful  
🗑
SDLC   Systems Development Life Cycle, Describes the lifespan of an information system  
🗑
System Planning and Selection   Formal process mainly to identify, plan, and select a development project from all possible projects that can be performed  
🗑
   
🗑
Systems Analysis   Designers gain a full understanding of the organizations current systems and then decide which new info system will be constructed  
🗑
Pseudocode   Used by systems analysts to express the way in data is transformed  
🗑
Data Flows   Represents the movement of data through an organization or within an info system  
🗑
System Design Elements   Human-Computer interface,Databases and files,Processing and logic  
🗑
HCI   Human-Computer Interface, the point of contact between a system and a user  
🗑
Designing Processing and Logic   Steps and procedures that transform raw data inputs into new or modified information  
🗑
Order of Phases of the Systems Development Life Cycle   Systems Planning and Selection,Systems analysis,Systems Design,Systems Implementation and Operation,Systems Maintnenance  
🗑
Making a Business Case   Refers to the process of identifying, quantifying, and presenting the value provided by a system  
🗑
Weighted Multicriteria Analysis   Method for deciding among different IS investments or when considering alternative designs for a system  
🗑
Proxy Variables   Alternative measures of outcomes when it is not easy to quantify the impact of an investment  
🗑
Patch Management Systems   System that uses the internet to to check for available patchs and/or updates  
🗑
Prototyping   Alternative to SDLC, which uses a trial-and-error approach for discovering how a system should operate  
🗑
Corrective Maintenance   Making changes to an information system to repair flaws in the design, coding, and implementation  
🗑
Adaptive Maintenance   Making changes to accommodate changes in business needs  
🗑
Perfective Maintenance   Making enhancements to improve processing performance or interface  
🗑
Preventive Maintenance   Making changes to a system to reduce the chance of future system failure  
🗑
End-User Development   Individuals within organizations build increasingly complex and useful applications after the system has already been implemented  
🗑
External Acquisition   Purchasing an existing system from an outside vendor such as IBM, HP Enterprise Services, or Accenture  
🗑
RFP   Request For Proposal A document that is used to tell vendors what an organizations requirements are  
🗑
Systems Benchmarking   Used to standardize performance tests to facilitate comparison between systems  
🗑
Shrink-Wrap Licenses   Contract is activated when the shrink wrap on the packaging is removed  
🗑
Click-Wrap Licenses   A license primarily used for downloaded software  
🗑
Enterprise License   License that usually contain limitations of liability and warranty disclaimers  
🗑
Computer Crime   The act of using a computer to commit an illegal act  
🗑
Hackers   Individuals who are knowledgeable enough to gain access to a computer system without authorization  
🗑
Hacktivists   Computer crimminals that attempt to break into systems or deface websites to promote political or idealogical goals  
🗑
Crackers   Individuals who break into computer systems with the intention of doing damage or committing a crime  
🗑
Information Modification   Occurs when someone accesses electronic information and then changes the information  
🗑
Malware   short for "malicious software" Refers to harmful Viruses, Worms, and Trojan horses  
🗑
Virus   Desructive program that disrupts the normal functioning of computer systems  
🗑
Worm   A variation of a Virus that is targeted at networks ultimately denying intenet access to users  
🗑
Trojan Horse   Destructive program like a virus, but does not copy itself  
🗑
Logic Bombs or Time Bombs   Variations of Trojan horses that lie in wait for unsuspecting computer users to perform a triggering operation  
🗑
Zombie Computers   Intruders infect computers located in homes, schools, and business with viruses or worms  
🗑
Spyware   Any software that covertly gathers information about a user through an Intenet connection  
🗑
Adware   Free software paid for by advertisements appearing during the use of the software  
🗑
Spam   Electronic junk mail or junk newsgroup postings  
🗑
Phishing   Used by spam e-mail to trick financial accounts and credit card holders into giving away their authorization information  
🗑
CAPTCHA   Completely Automated Public Turning Test to Tell Computers and Humans Apart  
🗑
Cookies   A message passed to a Web browser on a user's computer by a Web server to be stored as a text file on the computer  
🗑
Cybersquating   Dubious practice of registering a domain name and then trying to sell the name for money to the person, company, or organization that wants it  
🗑
Intellectual Property   Software for patent and copyright laws applied to works used in commerce  
🗑
Patents   Refers to process, machine, or material inventions  
🗑
Copyrights   Refers to creations of the mind such as music, literature, or software  
🗑
Warez   Slang term for stolen software  
🗑
Information System Security   Refers to precautions taken to keep all aspects of information systems safe  
🗑
Risk Analysis   process in which you access the value of the assets being protected  
🗑
Risk Reduction   Active countermeasures to protect your systems  
🗑
Risk Acceptance   Implementing no countermeasures and simply absorbing any damages that occur  
🗑
Risk Transference   Having someone else absorb the risk  
🗑
Biometrics   Sophisticated form of authentication used to govern access to systems, data, and/or facilities  
🗑
Access-Control Software   Special software used to keep stored information secure  
🗑
VPN   Virtual Private Network A network connection that is constructed dynamically within an existing network Also known as a secure tunnel  
🗑
Firewall   A part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network  
🗑
Encryption   Process of encoding messages before they enter the network to be securley transfered to the intended recipient  
🗑
Secure Sockets Layer   Popular public key encryption method used on the internet, created by Netscape  
🗑
Audit-Control Software   Used to keep track of computer activity so that auditors can spot suspicious activity and take action  
🗑
Backups   Important files saved to external hard drives  
🗑
Cold Backup Site   Empty warehouse with all necessary connections for power and communication  
🗑
Hot Backup Site   Fully equiped backup facility with exact replication of the most current data  
🗑
Mirrored   Everything is stored synchronously on two independent systems  
🗑
Closed-Circuit Television   Systems that monitor for physical intruders such as video cameras  
🗑
Collocation Facilities   Rented space for backup storage for only a few servers  
🗑
Computer Forensics   Use of formal invesitgative techniques to evalute digital information for judicial review  
🗑
Honeypot   A computer, data, or network site that is designed to lure crackers  
🗑
Information System Audit   Helps organizations assess the state of their IS controls to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity  
🗑
Sarbanes-Oxley Act   Government regulations on the requirement of controls in place to prevent misuse or fraud, controls to detect problem, and effective measures to correct problems  
🗑
Botherder   A criminal that has a botnet residing on a collection of zombie computers  
🗑
Requirements Collection   Process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how an IS should function  
🗑
Developmental Testing   Testing the correctness of individual modules and the integration of multiple modules performed by the programmer  
🗑
Alpha Testing   Testing of overall system to see whether it meets design requirements Performed by Software Tester  
🗑
Beta Testing   Testing of the capabilities of the system in the user enviroment with actual data Performed by actual system users  
🗑
Recovery Time Objectives   Specifies the maximum time allowed to recover from a catastrophic event  
🗑
Recovery Point Objectives   Specifies how current the back data should be  
🗑
3 Authentication Forms   Something You Have- Ex. Keys,Something You Know- Ex. Password,Something You Are- Ex. Fingerprint  
🗑
Acceptable Use Policies   Policies for people within the organization, with clearly spelled out penalties for noncompliance  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: united11
Popular Business sets