Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computers Chapter 9

jjjjjjjjjdd

TermDefinition
Information system collects, stored and processes data to provide useful, accurate and timely information typically within the context of an organization
Organization group of people working together to accomplish a goal
Enterprise Any organization that seeks profit by providing goods and services
Mission An organization's goal or plan
Mission Statement Describes not only an organizations goals but also the way the goals will be accomplished
Vertical market software is designed for a specific industry or enterprise; ie; the software that controls touchscreen order entry at fast food restaurants
Horizontal market software designed for common elements of many businesses
Workers the people who directly carry out the organizations mission
Managers determine organizational goals and plan how to achieve them
Tactical planning setting incremental goals that can be achieved in a year or less
Operational planning covers activities that make day-day operations run smoothly
Transaction an exchange between two parties that is recorded and stored in a computer system
Transaction Processing System provides a way to collect, process, store, display, modify or cancel transactions
Management Information System refers to any computer system that processes data and provides information within a business setting
Summary report combines groups or totals data
Exception report contains information that is outside of normal or acceptable ranges
Decision support system helps people to make decisions by directly manipulating data, accessing data from external sources, generating statistical projections and creating models of various scenario
Ecommerce refers to business transactions that are conducted electronically over a computer network
B2C Online storefront such as Zappos, amazon and Dell that offer merchandise and services to computers; business to consumer
C2C consumers sell to each other at popular auction and list sites such as ebay and Taobao; consumer to consumer
B2B + B2G business to business; business to government
Ecommerce application software that handles ecommerce transactions; payment processing based online
Payment gateway authorizes credit and debit cards, Paypal and Apple Pay transactions
SCM (supply chain management) maximize efficiency and profitability
CRM customer relationship management
Loyalty program rewards program which is a marketing effort that provides customers with incentives for making purchases
ERP(enterprise resource planning) suite of software modules that integrate major business activities; sometimes described as the CNS of an enterprise
Iterative SDLC mathematical procedure that generates a sequence of improving approximate solutions for a class of problems. A specific implementation of iterative method including termination criteria is an algorithm of iterative method
Critical path sequence of project network activities which add up to the longest overall duration, regardless is that longest duration has float or not. Also determines the shortest time possible to complete the project
Turnkey systems hardware and software neccessary for the particular application
unit testing ensure that it operates reliably and correctly when all modules have been completed and tested
system testing ensures that all the hardware and software components work together
system documentation describes a system's features, hardware architecture and programming
user documentation describes how to interact with the system to accomplish specific tasks
procedure handbook type of user documentation that contains step by step instructions for performing tasks
system conversion refers to the process of deactivating an old information system and activating a new one; also referred to as a "cutover" or "to go live"
acceptance testing designed to verify that the new information system works as required
maintenance phase involves the day-day operation of the system, making modifications to improve performance and correcting problems
Quality of service (QoS) refers to the level of performance a computer system provides
Quality of service metric technique used for measuring a specific QoS characteristic
Help Desk handle end-user problems; staffed by technical support specialists
MTFB (mean time between failures) measure of how reliable a hardware product or component is. Typically mesures in thousands or tens of thousands of hours between failures
MTFB of hardware disk drive 300,000hours
Data center specialized facility designed to hold and protect computer systems and data
Colocation center several corporations lease space and equipment
Lights out management (LOM) ability for a system administrator to monitor and manage servers by remote control.
A complete LOM system consists of a hardware component called the LOM module and a program facilitating continuous monitoring of variables such as microprocessor temp and utilization
Disaster Recovery Plan step by step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations
Data breach incident in which personal data is viewed, accessed or retrieved without authorization
Identity theft fraudulent use of someone's personal information to carry out transactions
Deterrents reduce the likelihood of a deliberate attack.
Physical deterrent limiting access to critical servers
Common deterrent security features such a multi-level authentication, password protection and biometric ID
preventative countermeasures shield vulnerabilities to render an attack unsuccessful or reduce its impact. Firewalls that prevent unauthorized access to a system and encryption that makes stolen data indecipherable are examples.
Corrective procedures reduce the effect of an attack. data backups, disaster recover plans and the availability to redundant hardware devices
Detection activities recognize attacks and trigger preventative countermeasures or corrective procedures
Fraud alert on your credit report to alert potential creditors or lenders; when they are alerted they can take steps to protect you
Created by: udon