click below
click below
Normal Size Small Size show me how
302 Manage these Key
Manage this
| Term | Definition |
|---|---|
| audit | process by which an organizations accounts and records are verified |
| business continuity | an organizations ability to function during and after a disaster |
| compliance | fulfilling the requirements of the law |
| consistency | stability, regularity |
| data | facts and figures |
| data processing | converting facts and figures into useful information |
| decision-making | choosing among alternatives |
| hack | unauthorized access to a computer system |
| information | data presented in a useful form |
| information management | the process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision-making |
| information overload | communication that is too much and/or comes too fast to process at one time |
| management information system (mis) | an integrated technology that assists with an organizations information management needs |
| outsourcing | acquiring assistance from outside organizations/consultants to obtain goods and services to accomplish business objectives or perform primary business activities |
| proprietary information | private information that belongs to an organization and cannot be released to the public |
| sarbanes-oxley act | a U.S. regulation mandating that public businesses comply with specific accounting requirements |
| spam | junk email that the recipient did not request; also known as unsolicited commercial email |
| trade secret | undisclosed information within a particular business of industry |
| viruses | computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations |
| wireless network | a computer network connected without the use of wires or cables |