Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

MIS FINAL EXAM

QuestionAnswer
TCP the most popular Layer 4 protocols. As a transport protocol, many functions, one is to break messages into pieces called segments and provide reliable transport for each segment
IP Layer 3. Used on the internet, but it Is used on many other internets as well. The chief purpose is to route packets across an internet, which is a network of networks.
VPN uses the internet to create the appearance of private point to point connections.
Cloud Processing is the elastic leasing of pooled computer resources that are accessed via internet .
Elastic means the amount of resources leased can be increased or decreased dramatically, programmatically, in a short span of time.
Pooled different organizations use the same physical hardware; they share that hardware through virtualization.
• Software as a Service (SaaS) provides not only hardware infrastructure but also an operating system and application programs on top of that hardware.
• Platform as a Service (PaaS) where vendors provide hosted computes, an operating system, and possibly a DBMS.
• Infrastructure as a service (IaaS) which is the cloud hosting of a bare server computer or disk drive.
Social Media IS is an information system that supports the sharing of content among networks of users
Crowd sourcing is a dynamic social media process of employing user to participate in product design to product redesign.
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Folksonomy is the content structure that has emerged from the processing of many users tag.
Social Capital is the investment in social relations with the expectation of returns in the marketplace.
Business Intelligance are information systems that process operational and other data to analyze past performance and to make predictions
• Granularity refers to the level of detail represented by data.
Data Warehouse which is a facility for managing an organization’s BI data.
Functions of Data warehouse obtain, cleanse, organize and relate, and catalog.
Data Mart is a data collection smaller than the data warehouse, that addresses the needs of a particular department or functional area of business
Data Mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction
Big Data is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.
System Development -or system analysis and design as it is sometimes called is the process of creating and maintaining information systems.
Brook's Law adding more people to a late project makes the project latter.
SDLC is the traditional process used to develop information systems
System Definition use management’s statement of the system needs in order to begin to define the new system.
Cost Feasibility involves an assessment of the cost of the project,
Schedule Feasibility is a difficult to determine because it is hard to estimate the time it will take to build the system.
Technical Feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
Organizational Feasibility concerns whether the new systems fits within the organizations customs, culture, charter, or legal requirements
Test Plans consists of sequences of actions that users will take when using the new system.
Beta Plans is the process of allowing future system users to try out the new system on their own.
System Conversion is often used for this activity because it implies the process of converting business activity from the old systems to new.
Piolt the organization implements the entire system on a limited portion of the business.
Phase new system is installed in phases across the organization.
Parallel the new system runs in parallel with the old one until the new system is tested and fully operational.
Plunge the organization shuts off the old system and starts the new system
CIO the title of the principal manager of the IT department.
CTO the head of the technology group. Sorts through new ideas and products to identify those that are most relevant to the organization
Technology investigates new information systems technologies and determines how the organization can benefit from them
Operation manages the computing infrastructure, including individual computers, networks, and communications
Development manages the process of creating new information systems as well as maintaining existing information systems.
Outsouring Relations this group exists in organization that has negotiated outsourcing agreements with other companies
Steering Commitee is a group of senior managers from the business functions that works with the CIO o set the IS priorities and decide among major IS projects.
Outsourcing is the process of hiring another organization to perform a service.
Human Errors include accidental problems caused by both employees and nonemployees.
Computer includes employees and former employees who intentionally destroy data or other system components
Natural Events includes fires, floods, hurricanes, earthquakes and other acts of nature.
Unauthorized Data disclosure when a threat obtains data that is supposed to be protected.
Incorrect Data Modification incorrectly increasing customer’s discount or in correctly modifying and employers salary.
Faculty Service includes problems that result because of incorrect system operation.
Denial of Service (D0S) human error in following procedures or a lack of procedures.
Loss of Infrastructure human accidents causes this.
Biometrics uses personal physical characteristics such as fingerprints, facial features, and retinal scan to authenticate users.
Malware is viruses worms, Trojan horses, spyware, and adware.
Firewall is a computing device that prevents unauthorized network access
Human Safeguard involve the people and procedure components of information systems.
Mobile Systems are information systems that support users in motion.
BYOB Policy is a statement concerning employees permissions and responsibility when they use their own device for organizational business.
Hyper social organizations-is an organization that uses social media to transform its interactions with customer, employees, and partners into mutually satisfying relationships with them and their communities.
Knowledge Management is the process of creating value from intellectual capital and sharing that knowledge with employees managers suppliers customers, and others who need that capital.
Expert Systems -are rule based systems that encode human knowledge in the form of if/then rules.
CMS are information systems that support the management and delivery of documents and other expressions of employee knowledge
GIS is an information systems that captures, stores, analyzes and displays geospatial date.
Users of GIS applications casual users, BI users, developers, operations personnel, and field personnel.
Map Projection is a technique for placing locations on the surface of the earth onto a flat surface.
Deliverables tasks that compose one of many measurable or observable steps in a development project
WBS is a hierarchy of the tasks required to complete a project.
Agile Development development process that conforms to the principles
JIT Design rather than design the complete overall systems at the beginning only those portions of the design that are needed to complete the current work are done.
Accelerator effect a dollar spent will contribute to $2-$3 dollars of the economy
Perimeter Firewall sits outside the organizational network; first device internet traffic encounters
Internal Firewall sits outside the organizational network.
Packet-Filtering Firewall examines each part of a message and determines whether to let the part pass
Virus is a computer program that replicates itself.
Trojan Horse viruses that masquerade as useful program files
worm is a virus that propagates using the internet
Spyware programs are installed on the users computer without the us knowing
Adware produces pop-up ads
Created by: Giants3172
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards