click below
click below
Normal Size Small Size show me how
302 Manage these Key
Manage This
Question | Answer |
---|---|
Audit | Process by which an organization's accounts and records are verified |
Business comtimuity | An organization's ability to function during and after a disaster |
Compliance | Fulfilling the requirements of the law |
Consistency | Stability; regularity |
Data processing | converting facts and figures into useful information |
Data | Facts and figures |
Decision-making | Choosing among alternatives |
Hack | Unauthorized access to a computer system |
Information | Data presented in a useful form |
Information managament | The process of accessing, processinh, maintaing, evaluating, and disseminating knowledge, facts, or, data for the purpose of assisting business decision-making |
Information overload | Communication that is too much and/or comes too fast to process at one time |
Management information system (MIS) | An intergrated technology that assists with an organization's information management needs |
Outsourcing | Acquiring assistance from outside oranizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities |
Proprietary information | Private information that belongs to an organization and cannot be released to the public |
Sarbanes-Oxley Act | A U.S regulation mandating that public businesses comply with specific accounting requirments |
Spam | Junk email that the recipient did not request; AKA unsolicited commercial email |
Trade secret | Undisclosed information within a particular business or industry |
Viruses | Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations |
Wireless network | A computer network connected without the use of wires or cables |