click below
click below
Normal Size Small Size show me how
MIS FINAL EXAM
| Question | Answer |
|---|---|
| TCP | the most popular Layer 4 protocols. As a transport protocol, many functions, one is to break messages into pieces called segments and provide reliable transport for each segment |
| IP | Layer 3. Used on the internet, but it Is used on many other internets as well. The chief purpose is to route packets across an internet, which is a network of networks. |
| VPN | uses the internet to create the appearance of private point to point connections. |
| Cloud Processing | is the elastic leasing of pooled computer resources that are accessed via internet . |
| Elastic | means the amount of resources leased can be increased or decreased dramatically, programmatically, in a short span of time. |
| Pooled | different organizations use the same physical hardware; they share that hardware through virtualization. |
| • Software as a Service (SaaS) | provides not only hardware infrastructure but also an operating system and application programs on top of that hardware. |
| • Platform as a Service (PaaS) | where vendors provide hosted computes, an operating system, and possibly a DBMS. |
| • Infrastructure as a service (IaaS) | which is the cloud hosting of a bare server computer or disk drive. |
| Social Media IS | is an information system that supports the sharing of content among networks of users |
| Crowd sourcing | is a dynamic social media process of employing user to participate in product design to product redesign. |
| Enterprise 2.0 | is the application of social media to facilitate the cooperative work of people inside organizations. |
| Folksonomy | is the content structure that has emerged from the processing of many users tag. |
| Social Capital | is the investment in social relations with the expectation of returns in the marketplace. |
| Business Intelligance | are information systems that process operational and other data to analyze past performance and to make predictions |
| • Granularity | refers to the level of detail represented by data. |
| Data Warehouse | which is a facility for managing an organization’s BI data. |
| Functions of Data warehouse | obtain, cleanse, organize and relate, and catalog. |
| Data Mart | is a data collection smaller than the data warehouse, that addresses the needs of a particular department or functional area of business |
| Data Mining | is the application of statistical techniques to find patterns and relationships among data for classification and prediction |
| Big Data | is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety. |
| System Development | -or system analysis and design as it is sometimes called is the process of creating and maintaining information systems. |
| Brook's Law | adding more people to a late project makes the project latter. |
| SDLC | is the traditional process used to develop information systems |
| System Definition | use management’s statement of the system needs in order to begin to define the new system. |
| Cost Feasibility | involves an assessment of the cost of the project, |
| Schedule Feasibility | is a difficult to determine because it is hard to estimate the time it will take to build the system. |
| Technical Feasibility | refers to whether existing information technology is likely to be able to meet the needs of the new system. |
| Organizational Feasibility | concerns whether the new systems fits within the organizations customs, culture, charter, or legal requirements |
| Test Plans | consists of sequences of actions that users will take when using the new system. |
| Beta Plans | is the process of allowing future system users to try out the new system on their own. |
| System Conversion | is often used for this activity because it implies the process of converting business activity from the old systems to new. |
| Piolt | the organization implements the entire system on a limited portion of the business. |
| Phase | new system is installed in phases across the organization. |
| Parallel | the new system runs in parallel with the old one until the new system is tested and fully operational. |
| Plunge | the organization shuts off the old system and starts the new system |
| CIO | the title of the principal manager of the IT department. |
| CTO | the head of the technology group. Sorts through new ideas and products to identify those that are most relevant to the organization |
| Technology | investigates new information systems technologies and determines how the organization can benefit from them |
| Operation | manages the computing infrastructure, including individual computers, networks, and communications |
| Development | manages the process of creating new information systems as well as maintaining existing information systems. |
| Outsouring Relations | this group exists in organization that has negotiated outsourcing agreements with other companies |
| Steering Commitee | is a group of senior managers from the business functions that works with the CIO o set the IS priorities and decide among major IS projects. |
| Outsourcing | is the process of hiring another organization to perform a service. |
| Human Errors | include accidental problems caused by both employees and nonemployees. |
| Computer | includes employees and former employees who intentionally destroy data or other system components |
| Natural Events | includes fires, floods, hurricanes, earthquakes and other acts of nature. |
| Unauthorized Data disclosure | when a threat obtains data that is supposed to be protected. |
| Incorrect Data Modification | incorrectly increasing customer’s discount or in correctly modifying and employers salary. |
| Faculty Service | includes problems that result because of incorrect system operation. |
| Denial of Service (D0S) | human error in following procedures or a lack of procedures. |
| Loss of Infrastructure | human accidents causes this. |
| Biometrics | uses personal physical characteristics such as fingerprints, facial features, and retinal scan to authenticate users. |
| Malware | is viruses worms, Trojan horses, spyware, and adware. |
| Firewall | is a computing device that prevents unauthorized network access |
| Human Safeguard | involve the people and procedure components of information systems. |
| Mobile Systems | are information systems that support users in motion. |
| BYOB Policy | is a statement concerning employees permissions and responsibility when they use their own device for organizational business. |
| Hyper | social organizations-is an organization that uses social media to transform its interactions with customer, employees, and partners into mutually satisfying relationships with them and their communities. |
| Knowledge Management | is the process of creating value from intellectual capital and sharing that knowledge with employees managers suppliers customers, and others who need that capital. |
| Expert Systems | -are rule based systems that encode human knowledge in the form of if/then rules. |
| CMS | are information systems that support the management and delivery of documents and other expressions of employee knowledge |
| GIS | is an information systems that captures, stores, analyzes and displays geospatial date. |
| Users of GIS applications | casual users, BI users, developers, operations personnel, and field personnel. |
| Map Projection | is a technique for placing locations on the surface of the earth onto a flat surface. |
| Deliverables | tasks that compose one of many measurable or observable steps in a development project |
| WBS | is a hierarchy of the tasks required to complete a project. |
| Agile Development | development process that conforms to the principles |
| JIT Design | rather than design the complete overall systems at the beginning only those portions of the design that are needed to complete the current work are done. |
| Accelerator effect | a dollar spent will contribute to $2-$3 dollars of the economy |
| Perimeter Firewall | sits outside the organizational network; first device internet traffic encounters |
| Internal Firewall | sits outside the organizational network. |
| Packet-Filtering Firewall | examines each part of a message and determines whether to let the part pass |
| Virus | is a computer program that replicates itself. |
| Trojan Horse | viruses that masquerade as useful program files |
| worm | is a virus that propagates using the internet |
| Spyware | programs are installed on the users computer without the us knowing |
| Adware | produces pop-up ads |