click below
click below
Normal Size Small Size show me how
Computers Chapter 9
jjjjjjjjjdd
| Term | Definition |
|---|---|
| Information system | collects, stored and processes data to provide useful, accurate and timely information typically within the context of an organization |
| Organization | group of people working together to accomplish a goal |
| Enterprise | Any organization that seeks profit by providing goods and services |
| Mission | An organization's goal or plan |
| Mission Statement | Describes not only an organizations goals but also the way the goals will be accomplished |
| Vertical market | software is designed for a specific industry or enterprise; ie; the software that controls touchscreen order entry at fast food restaurants |
| Horizontal market | software designed for common elements of many businesses |
| Workers | the people who directly carry out the organizations mission |
| Managers | determine organizational goals and plan how to achieve them |
| Tactical planning | setting incremental goals that can be achieved in a year or less |
| Operational planning | covers activities that make day-day operations run smoothly |
| Transaction | an exchange between two parties that is recorded and stored in a computer system |
| Transaction Processing System | provides a way to collect, process, store, display, modify or cancel transactions |
| Management Information System | refers to any computer system that processes data and provides information within a business setting |
| Summary report | combines groups or totals data |
| Exception report | contains information that is outside of normal or acceptable ranges |
| Decision support system | helps people to make decisions by directly manipulating data, accessing data from external sources, generating statistical projections and creating models of various scenario |
| Ecommerce | refers to business transactions that are conducted electronically over a computer network |
| B2C | Online storefront such as Zappos, amazon and Dell that offer merchandise and services to computers; business to consumer |
| C2C | consumers sell to each other at popular auction and list sites such as ebay and Taobao; consumer to consumer |
| B2B + B2G | business to business; business to government |
| Ecommerce application | software that handles ecommerce transactions; payment processing based online |
| Payment gateway | authorizes credit and debit cards, Paypal and Apple Pay transactions |
| SCM (supply chain management) | maximize efficiency and profitability |
| CRM | customer relationship management |
| Loyalty program | rewards program which is a marketing effort that provides customers with incentives for making purchases |
| ERP(enterprise resource planning) | suite of software modules that integrate major business activities; sometimes described as the CNS of an enterprise |
| Iterative SDLC | mathematical procedure that generates a sequence of improving approximate solutions for a class of problems. A specific implementation of iterative method including termination criteria is an algorithm of iterative method |
| Critical path | sequence of project network activities which add up to the longest overall duration, regardless is that longest duration has float or not. Also determines the shortest time possible to complete the project |
| Turnkey systems | hardware and software neccessary for the particular application |
| unit testing | ensure that it operates reliably and correctly when all modules have been completed and tested |
| system testing | ensures that all the hardware and software components work together |
| system documentation | describes a system's features, hardware architecture and programming |
| user documentation | describes how to interact with the system to accomplish specific tasks |
| procedure handbook | type of user documentation that contains step by step instructions for performing tasks |
| system conversion | refers to the process of deactivating an old information system and activating a new one; also referred to as a "cutover" or "to go live" |
| acceptance testing | designed to verify that the new information system works as required |
| maintenance phase | involves the day-day operation of the system, making modifications to improve performance and correcting problems |
| Quality of service (QoS) | refers to the level of performance a computer system provides |
| Quality of service metric | technique used for measuring a specific QoS characteristic |
| Help Desk | handle end-user problems; staffed by technical support specialists |
| MTFB (mean time between failures) | measure of how reliable a hardware product or component is. Typically mesures in thousands or tens of thousands of hours between failures |
| MTFB of hardware disk drive | 300,000hours |
| Data center | specialized facility designed to hold and protect computer systems and data |
| Colocation center | several corporations lease space and equipment |
| Lights out management (LOM) | ability for a system administrator to monitor and manage servers by remote control. |
| A complete LOM system consists of | a hardware component called the LOM module and a program facilitating continuous monitoring of variables such as microprocessor temp and utilization |
| Disaster Recovery Plan | step by step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations |
| Data breach | incident in which personal data is viewed, accessed or retrieved without authorization |
| Identity theft | fraudulent use of someone's personal information to carry out transactions |
| Deterrents | reduce the likelihood of a deliberate attack. |
| Physical deterrent | limiting access to critical servers |
| Common deterrent | security features such a multi-level authentication, password protection and biometric ID |
| preventative countermeasures | shield vulnerabilities to render an attack unsuccessful or reduce its impact. Firewalls that prevent unauthorized access to a system and encryption that makes stolen data indecipherable are examples. |
| Corrective procedures | reduce the effect of an attack. data backups, disaster recover plans and the availability to redundant hardware devices |
| Detection activities | recognize attacks and trigger preventative countermeasures or corrective procedures |
| Fraud alert | on your credit report to alert potential creditors or lenders; when they are alerted they can take steps to protect you |