Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IS Final

QuestionAnswer
Two branches of IT Architecture and Infrastructure
What does architecture do? Translates strategy to plans for IS and strategy becomes the blueprint for the IS
What does the infrastructure do? The actual technologies that support the flow and processing of ino
What are the business objectives of IS? Achieving operational excellence, developing new products and services, attaining customer service, improving decision making, promoting competitive advantage, ensuring survival
Five basic business entities Suppliers, customers, employees, invoices, products and services
Four basic business functions Manufacturing, sales and marketing, finance, hr
Examples of hospitality systems GDS CRS ERS Global distribution system- hotels flights cars books and sells. central Reservation System- Used by chains to coordinate reservations for company. Electronic Reservation System- Propertly level reservation system
Computers are measured in FLOPS floating point operations per second
standalone computer for a specific purpose workstation
handles hundreds of users simultaneously mainframe
smaller version of mainframe minicomputer
File storage or computer that processes HTMAL pages Server
Fastest mainframe supercomputer
software program that emultates hardware virtual machine
federal law to limit the collection and use of personal info about children by the operators of Internet services and web sites. 1998 Children's Online Privacy Protection Act
policies, procedures, and tools for managing the retention, destruction, and storage of electronic records Electronic Records Management
Five Moral Dimensions of the Info Age Information rights, property rights, accountability and control, system quality, quality of life
governs the privacy and security of health info records HIPAA
financial institutions to provide each consumer with a privacy notice Gramm-Leach-Billey Act
protects investors from the possibility of fraudulent accounting activities by corporations Sarbanes-Oxley Act
intended for streamlining US companies compliance with EU Drive Internal Safe Harbor Polici
Intellectual property aspects: Trade secrets, copyrights, patents, challeges DMCA and file sharing
any violations of criminal law that involve the knowledge of computer technology for their perpetration, investigation, or prosecution Computer crime
Identity theft means: phishing, evil twins, pharming, computer abuse
Malicious software designed to replicate itself by coping itself into the other programs virus
malicious software that replicates itself by filling all of the storage space worm
Malcious software that appears to be legitimate but is designed to destruct Trojan horse
malsof sends info about web surfing habits spyware
malsof runs invisibly in background to record keystrokes Key logger
malsof set of programs that subvert control of the OS can conceal Rootkit
uses programming skills to gain illegal access to a computer network or file Hacker
Uses low-level hacker skills Cracker
Theft of data and attacks on servers people and government Cyber vandalism
faking the sending address of a transmission spoofing
intercepting and logging traffic passing over a digital network sniffing
assault on a network causing slow down or stoppage of communication Denial of Service Attack
large number of compromised computers used to DOS attack Botnet
cracking techniques that rely on weaknesses in wetware to trick people into revealing info social-engineering
How can you secure a wireless network? use Virtual Private Network tech, Wi-Fi alliance, Extensible Authentication Protocol
How can you access control to protect company data? Authentication, access token, smart cards, biometric authentication
a combination of hardware and software that prevents unauthorized users from accessing private networks Firewall
Monitor hot spots on corporate networks to detect and deter intruders Intrusion Detection Systems
Software check computers for the presence of malware Antivirus and antispyware
activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities to access the functions business continuity
How can you ensure business continuity? Downtime, fault-tolerant computer systems, high-availability computing, recovery-oriented computing, disaster recovery planning
Business continuity measure designed to prevent failures due to hardware Fault-tolerant computer systems
Business continuity measure designed for multiprocessing systems that can quickly recover from a failure High-availability computing
Business continuity measure that recovers based on redundancy Recovery-oriented computing
Business continuity planning and securing outsourcing componenet of continuity Disaster recovery planning
Example of info system to collect and process data on company employees HRIS
Term that describes how well an infrastructure component can adapt to increased demands? Scalability
Long term goals Business stratefy
A company's purpose Mission
Specific actionable goal for use of tech IS Goal
1st step of IS org change Informate
IS org change 2nd step Automate
Info used to make projections in an org Business Intelligence
Plan of org to provide info services to customers IS strategy
Form of social context directly influences info system immediate context
Interdependence of a system leads to Systemic Effects
Moore predicted microprocessor would double every 2 years
What may not match an org's current work processes and data Off the shelf software
What is not an advantage of open source software Support available only online comm of core development
Traditional systems development life cycle, users are limited to providing info requirements
How many bytes in a giga 1,000,000,000
Develop systems based on producing deliverables often which grow incrementally from one deliverable to anuther until final is complete Iterative
T or F: Computers can run any type of program regardless of memory False
T or F: Prototyping allows user to clarify info requirements as they use prototype True
T or F: SDLC used to determine if a project should be pursued and focuses on investigation and planning False
Computer Technologies become obsolete faster or slower than others? Faster
Limited small inexpensive computers Minicomputer
Running application from a network server or downloading software from a network is called cloud computing
Event management process, when and where step? Organize
A comp that executes demands requested by a webserver to fetch data from database Application Server
In System Design of SDLC, the continual enhancement of requirements of a project during system construction Score Creep
Type of conversion when a unit o an org is chosen for trial? Pilot
Concurrent use of processing and data storage resources ofmany computers to a single problem Grid computing
Most processing power computers Super
Electronic storage device without moving parts Flash Memory Drives
T or F: SLDC is used to determine if a project should be pursued and focuses on the investigation and planning aspects only False
T or F: JAD is like RAD except JAD is more integrally involed with users True
T or F: Most management info systems use sophisticated math models and stats False
T or F: If you only have a little time, use RAd not JAD True
Method of systems development is expensive and often applied to entreprise wide installation of systems SDLC
What files can exist in POS functional system? Transaction, process, management reporting
What is not a part of systems analysis? Hardware and software choice
Backbone, main system for org PMS
System that contains a range of interfaces to include Local Area Networks, metropolitan area networks to wide area networks with global tech capacity CRS Central Reservations System
Development process is the traditional method for all steps required to build an IS SDLC
Systems used for purchase of material resource available through supply chain in hospitality Inventory and purchasing system
Type of architecture that software applications are created by combining self-contained software services that communicate with each other SOA
Software used to connect processes in one or more cmps in a network, website connection to database Middleware
STR client groups Hotel ops and real estate investors
Comp system that performs and records daily dealings to conduct business Transaction level system
4 aspects IS infrastructure hardware, software, network, data components
3 pieces of data STR collects Rooms Available, Rooms Sold, Rooms Revenue
Collects data from various key usiness processes and stores the data in one comprehensive data repository, usable by other parts Entreprise system
Infrastructure component employs a large central computer that could handle functionality of IS Mainframe
Business of selling a product POS
Systems used for purchase of material resource through supply chain Procurement
System contains range of hardware LANS MANS WANS with capacity for global CRS central reservations system
Not a part of problem solving process Solution info change
Smallest to largest byte system Kilo Mega Giga Tera Peta Exa
Self contained services that communicate with eachother to create a working soft app SOA
SDLC systems development stage that determines how info system will do what is needed System design
Plan an org uses to provide info service to customers Info Strategy
Software whose source code is available at no cost Open Source
Amount and type of memory affects all but cost of processing data
Phase of SDLC includes specification for IS System Design
Number of servers work on a network to complete a business process, while a number of other servers work on another Multitiered client server network
Process of running old csystem concurrently with new system is what conversion? Parallel
T or F: Internet advertising grows at more than 70% per year False
T or F: No assembly for entreprise False
T or F: Infrastructure always before architecture False
Primary purpose of POS system Transaction processing
Designed to process document request and repository for data Web server
CRM stands for Customer relationship management
Grid computing is a form of distributed computing
Type of entreprise storage system that is an architecture for building ddicated networks for access to storage Storage area network
Not function of PMS Car rental
Key actors in immediate environment Regulations
Weather and planets on what comp Super
Form of secondary storage laser disk Optical storage
Created by: studybuddy44
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards