Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computers Chapter 9

jjjjjjjjjdd

TermDefinition
Information system collects, stored and processes data to provide useful, accurate and timely information typically within the context of an organization
Organization group of people working together to accomplish a goal
Enterprise Any organization that seeks profit by providing goods and services
Mission An organization's goal or plan
Mission Statement Describes not only an organizations goals but also the way the goals will be accomplished
Vertical market software is designed for a specific industry or enterprise; ie; the software that controls touchscreen order entry at fast food restaurants
Horizontal market software designed for common elements of many businesses
Workers the people who directly carry out the organizations mission
Managers determine organizational goals and plan how to achieve them
Tactical planning setting incremental goals that can be achieved in a year or less
Operational planning covers activities that make day-day operations run smoothly
Transaction an exchange between two parties that is recorded and stored in a computer system
Transaction Processing System provides a way to collect, process, store, display, modify or cancel transactions
Management Information System refers to any computer system that processes data and provides information within a business setting
Summary report combines groups or totals data
Exception report contains information that is outside of normal or acceptable ranges
Decision support system helps people to make decisions by directly manipulating data, accessing data from external sources, generating statistical projections and creating models of various scenario
Ecommerce refers to business transactions that are conducted electronically over a computer network
B2C Online storefront such as Zappos, amazon and Dell that offer merchandise and services to computers; business to consumer
C2C consumers sell to each other at popular auction and list sites such as ebay and Taobao; consumer to consumer
B2B + B2G business to business; business to government
Ecommerce application software that handles ecommerce transactions; payment processing based online
Payment gateway authorizes credit and debit cards, Paypal and Apple Pay transactions
SCM (supply chain management) maximize efficiency and profitability
CRM customer relationship management
Loyalty program rewards program which is a marketing effort that provides customers with incentives for making purchases
ERP(enterprise resource planning) suite of software modules that integrate major business activities; sometimes described as the CNS of an enterprise
Iterative SDLC mathematical procedure that generates a sequence of improving approximate solutions for a class of problems. A specific implementation of iterative method including termination criteria is an algorithm of iterative method
Critical path sequence of project network activities which add up to the longest overall duration, regardless is that longest duration has float or not. Also determines the shortest time possible to complete the project
Turnkey systems hardware and software neccessary for the particular application
unit testing ensure that it operates reliably and correctly when all modules have been completed and tested
system testing ensures that all the hardware and software components work together
system documentation describes a system's features, hardware architecture and programming
user documentation describes how to interact with the system to accomplish specific tasks
procedure handbook type of user documentation that contains step by step instructions for performing tasks
system conversion refers to the process of deactivating an old information system and activating a new one; also referred to as a "cutover" or "to go live"
acceptance testing designed to verify that the new information system works as required
maintenance phase involves the day-day operation of the system, making modifications to improve performance and correcting problems
Quality of service (QoS) refers to the level of performance a computer system provides
Quality of service metric technique used for measuring a specific QoS characteristic
Help Desk handle end-user problems; staffed by technical support specialists
MTFB (mean time between failures) measure of how reliable a hardware product or component is. Typically mesures in thousands or tens of thousands of hours between failures
MTFB of hardware disk drive 300,000hours
Data center specialized facility designed to hold and protect computer systems and data
Colocation center several corporations lease space and equipment
Lights out management (LOM) ability for a system administrator to monitor and manage servers by remote control.
A complete LOM system consists of a hardware component called the LOM module and a program facilitating continuous monitoring of variables such as microprocessor temp and utilization
Disaster Recovery Plan step by step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations
Data breach incident in which personal data is viewed, accessed or retrieved without authorization
Identity theft fraudulent use of someone's personal information to carry out transactions
Deterrents reduce the likelihood of a deliberate attack.
Physical deterrent limiting access to critical servers
Common deterrent security features such a multi-level authentication, password protection and biometric ID
preventative countermeasures shield vulnerabilities to render an attack unsuccessful or reduce its impact. Firewalls that prevent unauthorized access to a system and encryption that makes stolen data indecipherable are examples.
Corrective procedures reduce the effect of an attack. data backups, disaster recover plans and the availability to redundant hardware devices
Detection activities recognize attacks and trigger preventative countermeasures or corrective procedures
Fraud alert on your credit report to alert potential creditors or lenders; when they are alerted they can take steps to protect you
Created by: udon
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards