click below
click below
Normal Size Small Size show me how
302 Manage Key Terms
Manage this
| Term | Definition |
|---|---|
| Audit | Process by which an organizations accounts and records are verified. |
| Business Continuity | An organizations ability to function during and after a disaster. |
| Compliance | Fulfilling the requirements of the law. |
| Consistency | Stability: Regularity. |
| Data | Facts and figures. |
| Data Processing | Converting facts and figures into useful information. |
| Decision Making | Choosing among alternatives. |
| Hack | Unauthorized access to a computer system. |
| Information | Data presented in a useful form. |
| Information Managment | The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision making. |
| Information Overload | Communication that is too much and/or comes too fast to process at one time. |
| Management Information system (MIS) | As integrated technology that assists with an organizations information management needs, |
| Outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or preform primary business activities. |
| Proprietary Information | Private information that belongs to an organization and cannot be released to the public. |
| Sarbanes-Oxley Act | A US regulation mandating that public businesses must comply with specific accounting requirements. |
| Spam | Junk email that the recipient did not request: also known as unsolicited commercial email |
| Trade Secret | Undisclosed information within a particular business or industry |
| Viruses | Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations |
| Wireless Network | A computer network connected without the use of wires or cables. |