click below
click below
Normal Size Small Size show me how
5.01 BM II 4.01
NF-110
| Term | Definition |
|---|---|
| Audit | Process which an organization's accounts and records are verified |
| Business continuity | An organization's ability to function after disaster |
| Compliance | Fulfilling the requirements of the law |
| Consistency | Stability; Regularity |
| Data | Facts and Figures |
| Data Processing | Converting facts and figures into useful information |
| Decision Making | Choosing among alternatives |
| Hack | Unauthorizes access to a computer system |
| Information | Knowledge, Facts, or Data presented in a useful form |
| Information management | the process of accessing, processing. maintaining, evaluating, and disseminating knowledge, facts or data for the purpose of assisting business decision making |
| Information Overload | communication that is too much and/or comes too fast to process at one time |
| Management Information System (MIS) | An Integrated technology that assists with an Organization's information Management needs |
| Outsourcing | Acquiring assistance from outsourcing organization/consultants to obtain goods or services to accomplish business objectives or perform primary business activities |
| Propriety information | Private Information that belongs to an organization and cannot be Released to the public |
| Sarbanes-Oxley Act | A U.S. Regulation Mandating that public business comply with specific accounting requirements |
| Spam | Junk email that the recipient did not request also known as unsolicited commercial email |
| Trade secret | Undisclosed information within a particular business or industry |
| Virus | A computer program that downloads to your computer or network without your permission |
| Wireless network | A computer network connected without the use of wires or cables |