click below
click below
Normal Size Small Size show me how
5.01BM II 4.01 NF-11
| Question | Answer |
|---|---|
| AUDIT | Process by which an organization's accounts and records are verified |
| BUSINESS CONTINUITY | An organization's ability to function after a disaster |
| COMPILANCE | Fulfilling the requirement of the law |
| CONSISTENCY | Stability; regularity |
| DATA | Facts and figures |
| DATA PROCESSING | Converting facts and figures into useful information |
| HACK | Unauthorized access to a computer system |
| INFORMATION MANAGMENT | The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts or data for the purpose of assisting business decisions making |
| INFORMATION OVERLOAD | Communication that is too much and/or comes too fast to process at one time |
| MANAGMENT INFORMATION SYSTEM (MIS) | An integrated technology that assists with an organization's information management needs |
| OUTSOURCING | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities |
| PROPRIETARY INFORMATION | Private information that belongs to an organization and cannot be released to the public |
| SARBANES-OXLEY ACT | A U.S. regulation mandating that public businesses comply with specific accounting requirements |
| SPAM | Junk email that the recipient did not request; also known as unsolicited commercial email |
| TRADE SECRET | Undisclosed information within a particular business or industry |
| VIRUS | A computer program that downloads to your computer or network within your permissions |
| WIRELESS NETWORK | A computer network connected within he use of wires or cables |
| DECISIONS MAKING | Choosing among alternatives |
| INFORMATION | Knowledge, facts , or data presented in a useful form |